Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2022-38178
Vulnerability from cvelistv5
Published
2022-09-21 10:15
Modified
2024-09-17 02:58
Severity ?
EPSS score ?
Summary
By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ISC | BIND9 |
Version: Open Source Branch 9.9 9.9.12 through versions up to and including 9.9.13 Version: Open Source Branch 9.10 9.10.7 through versions up to and including 9.10.8 Version: Open Source Branches 9.11 through 9.16 9.11.3 through versions before 9.16.33 Version: Open Source Branch 9.18 9.18.0 through versions before 9.18.7 Version: Supported Preview Branch 9.11-S 9.11.4-S1 through versions up to and including 9.11.37-S1 Version: Supported Preview Branch 9.16-S 9.16.8-S1 through versions before 9.16.33-S1 Version: Development Branch 9.19 9.19.0 through versions before 9.19.5 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:45:52.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://kb.isc.org/docs/cve-2022-38178" }, { "name": "[oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/09/21/3" }, { "name": "DSA-5235", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5235" }, { "name": "FEDORA-2022-ef038365de", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/" }, { "name": "FEDORA-2022-8268735e06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/" }, { "name": "FEDORA-2022-b197d64471", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/" }, { "name": "[debian-lts-announce] 20221005 [SECURITY] [DLA 3138-1] bind9 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html" }, { "name": "GLSA-202210-25", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202210-25" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20221228-0009/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "BIND9", "vendor": "ISC", "versions": [ { "status": "affected", "version": "Open Source Branch 9.9 9.9.12 through versions up to and including 9.9.13" }, { "status": "affected", "version": "Open Source Branch 9.10 9.10.7 through versions up to and including 9.10.8" }, { "status": "affected", "version": "Open Source Branches 9.11 through 9.16 9.11.3 through versions before 9.16.33" }, { "status": "affected", "version": "Open Source Branch 9.18 9.18.0 through versions before 9.18.7" }, { "status": "affected", "version": "Supported Preview Branch 9.11-S 9.11.4-S1 through versions up to and including 9.11.37-S1" }, { "status": "affected", "version": "Supported Preview Branch 9.16-S 9.16.8-S1 through versions before 9.16.33-S1" }, { "status": "affected", "version": "Development Branch 9.19 9.19.0 through versions before 9.19.5" } ] } ], "datePublic": "2022-09-21T00:00:00", "descriptions": [ { "lang": "en", "value": "By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources." } ], "exploits": [ { "lang": "en", "value": "This flaw was discovered in internal testing. We are not aware of any active exploits." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "In BIND 9.9.12 -\u003e 9.9.13, 9.10.7 -\u003e 9.10.8, 9.11.3 -\u003e 9.16.32, 9.18.0 -\u003e 9.18.6, versions 9.11.4-S1 -\u003e 9.11.37-S1, 9.16.8-S1 -\u003e 9.16.32-S1 of the BIND Supported Preview Edition, and versions 9.19.0 -\u003e 9.19.4 of the BIND 9.19 development branch, the DNSSEC verification code for the EdDSA algorithm leaks memory when there is a signature length mismatch.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-28T00:00:00", "orgId": "404fd4d2-a609-4245-b543-2c944a302a22", "shortName": "isc" }, "references": [ { "url": "https://kb.isc.org/docs/cve-2022-38178" }, { "name": "[oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/09/21/3" }, { "name": "DSA-5235", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5235" }, { "name": "FEDORA-2022-ef038365de", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/" }, { "name": "FEDORA-2022-8268735e06", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/" }, { "name": "FEDORA-2022-b197d64471", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/" }, { "name": "[debian-lts-announce] 20221005 [SECURITY] [DLA 3138-1] bind9 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html" }, { "name": "GLSA-202210-25", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202210-25" }, { "url": "https://security.netapp.com/advisory/ntap-20221228-0009/" } ], "solutions": [ { "lang": "en", "value": "Upgrade to the patched release most closely related to your current version of BIND: BIND 9.16.33, BIND 9.18.7, BIND 9.19.5, or for BIND Supported Preview Edition (a special feature preview branch of BIND provided to eligible ISC support customers): BIND 9.16.33-S1." } ], "source": { "discovery": "INTERNAL" }, "title": "Memory leaks in EdDSA DNSSEC verification code", "workarounds": [ { "lang": "en", "value": "Disable the following algorithms in your configuration using the disable-algorithms option: ED25519, ED448. Note that this causes zones signed with these algorithms to be treated as insecure." } ] } }, "cveMetadata": { "assignerOrgId": "404fd4d2-a609-4245-b543-2c944a302a22", "assignerShortName": "isc", "cveId": "CVE-2022-38178", "datePublished": "2022-09-21T10:15:29.078642Z", "dateReserved": "2022-08-12T00:00:00", "dateUpdated": "2024-09-17T02:58:12.991Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-38178\",\"sourceIdentifier\":\"security-officer@isc.org\",\"published\":\"2022-09-21T11:15:09.733\",\"lastModified\":\"2024-11-21T07:15:56.780\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.\"},{\"lang\":\"es\",\"value\":\"Al falsificar el resolver objetivo con respuestas que presentan una firma EdDSA malformada, un atacante puede desencadenar una peque\u00f1a p\u00e9rdida de memoria. Es posible erosionar gradualmente la memoria disponible hasta el punto de que named sea bloqueado por falta de recursos\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-officer@isc.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.9.12\",\"versionEndIncluding\":\"9.9.13\",\"matchCriteriaId\":\"444F158A-CA67-4E10-9F4B-DC47B9855E95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.10.7\",\"versionEndIncluding\":\"9.10.8\",\"matchCriteriaId\":\"B60E5A42-D9B1-47FF-95AB-E19E54AC90C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.11.3\",\"versionEndIncluding\":\"9.16.32\",\"matchCriteriaId\":\"2D33CEC6-E786-49B7-8DDA-13250DB1C9C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.3:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"C2FE13E1-0646-46FC-875B-CB4C34E20101\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.3:s4:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"39995ADF-74CC-4035-ADB2-010F676FCEC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.5:s3:*:*:*:supported_preview:*:*\",\"matchCriteriaId\":\"B6F72F80-D178-4F6D-8D16-85C0DEEE275B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.5:s3:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"1AA16E51-819C-4A1B-B66E-1C60C1782C0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"91533F9F-C0E5-4E84-8A4C-F744F956BF97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.5:s6:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"46E6A4BD-D69B-4A70-821D-5612DD1315EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"8AF9D390-0D5B-4963-A2D3-BF1E7CD95E9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.7:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"AB2B92F1-6BA8-41CA-9000-E0633462CC28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.8:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"02CA4635-7DFC-408E-A837-856E0F96CA1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.12:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"3CABCB08-B838-45F7-AA87-77C6B8767DD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.14-s1:*:*:*:preview:*:*:*\",\"matchCriteriaId\":\"FB597385-BCFD-4CDB-9328-B4F76D586E4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.19-s1:*:*:*:preview:*:*:*\",\"matchCriteriaId\":\"42C76CEF-FD0B-40A4-B246-A71F3EC72B29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.21:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"5CC1F26C-4757-4C87-BD8B-2FA456A88C6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.27:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"582A4948-B64F-45D4-807A-846A85BB6B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.29:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"F22E7F6A-0714-480D-ACDF-5027FD6697B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.35:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"255AEB06-F071-4433-93E5-9436086C1A6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.11.37:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"EF14D712-5FCF-492F-BE3E-745109E9D6E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.16.8:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"288EAD80-574B-4839-9C2C-81D6D088A733\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.16.11:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"3595F024-F910-4356-8B5B-D478960FF574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.16.13:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"94661BA2-27F8-4FFE-B844-9404F735579D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.16.21:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"751E37C2-8BFD-4306-95C1-8C01CE495FA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.16.32:s1:*:*:supported_preview:*:*:*\",\"matchCriteriaId\":\"CC432820-F1A2-4132-A673-2620119553C5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2022/09/21/3\",\"source\":\"security-officer@isc.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://kb.isc.org/docs/cve-2022-38178\",\"source\":\"security-officer@isc.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html\",\"source\":\"security-officer@isc.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/\",\"source\":\"security-officer@isc.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/\",\"source\":\"security-officer@isc.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/\",\"source\":\"security-officer@isc.org\"},{\"url\":\"https://security.gentoo.org/glsa/202210-25\",\"source\":\"security-officer@isc.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20221228-0009/\",\"source\":\"security-officer@isc.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5235\",\"source\":\"security-officer@isc.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/09/21/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://kb.isc.org/docs/cve-2022-38178\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202210-25\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20221228-0009/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5235\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2022_6780
Vulnerability from csaf_redhat
Published
2022-10-04 16:06
Modified
2024-11-22 20:21
Summary
Red Hat Security Advisory: bind security update
Notes
Topic
An update for bind is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)
* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for bind is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.\n\nSecurity Fix(es):\n\n* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)\n\n* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6780", "url": "https://access.redhat.com/errata/RHSA-2022:6780" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2128601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601" }, { "category": "external", "summary": "2128602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6780.json" } ], "title": "Red Hat Security Advisory: bind security update", "tracking": { "current_release_date": "2024-11-22T20:21:28+00:00", "generator": { "date": "2024-11-22T20:21:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:6780", "initial_release_date": "2022-10-04T16:06:59+00:00", "revision_history": [ { "date": "2022-10-04T16:06:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-10-04T16:06:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T20:21:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-chroot-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-chroot-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-devel-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-devel-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-libs-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-libs-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-sdb-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-sdb-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-utils-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-utils-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-debugsource-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-debugsource-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-export-devel-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-export-devel-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.13-6.el8_2.4.aarch64", "product": { "name": "bind-export-libs-32:9.11.13-6.el8_2.4.aarch64", "product_id": "bind-export-libs-32:9.11.13-6.el8_2.4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.13-6.el8_2.4?arch=aarch64\u0026epoch=32" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-chroot-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-chroot-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-devel-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-devel-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-libs-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-libs-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-sdb-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-sdb-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-utils-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-utils-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le", "product": { "name": "bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le", "product_id": "bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.13-6.el8_2.4?arch=ppc64le\u0026epoch=32" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-chroot-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-chroot-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-devel-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-devel-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-libs-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-libs-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-sdb-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-sdb-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-utils-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-utils-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-debugsource-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-debugsource-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-export-devel-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-export-devel-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.13-6.el8_2.4.x86_64", "product": { "name": "bind-export-libs-32:9.11.13-6.el8_2.4.x86_64", "product_id": "bind-export-libs-32:9.11.13-6.el8_2.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.13-6.el8_2.4?arch=x86_64\u0026epoch=32" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bind-devel-32:9.11.13-6.el8_2.4.i686", "product": { "name": "bind-devel-32:9.11.13-6.el8_2.4.i686", "product_id": "bind-devel-32:9.11.13-6.el8_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.13-6.el8_2.4?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.13-6.el8_2.4.i686", "product": { "name": "bind-libs-32:9.11.13-6.el8_2.4.i686", "product_id": "bind-libs-32:9.11.13-6.el8_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.13-6.el8_2.4?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.i686", "product": { "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.i686", "product_id": "bind-libs-lite-32:9.11.13-6.el8_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.13-6.el8_2.4?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.i686", "product": { "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.i686", "product_id": "bind-lite-devel-32:9.11.13-6.el8_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.13-6.el8_2.4?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686", "product": { "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686", "product_id": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.13-6.el8_2.4?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686", "product": { "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686", "product_id": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.13-6.el8_2.4?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.13-6.el8_2.4.i686", "product": { "name": "bind-debugsource-32:9.11.13-6.el8_2.4.i686", "product_id": "bind-debugsource-32:9.11.13-6.el8_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.13-6.el8_2.4?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.i686", "product": { "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.i686", "product_id": "bind-debuginfo-32:9.11.13-6.el8_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.13-6.el8_2.4?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "product": { "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "product_id": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.13-6.el8_2.4?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "product": { "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "product_id": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.13-6.el8_2.4?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686", "product_id": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.13-6.el8_2.4?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686", "product_id": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.13-6.el8_2.4?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.13-6.el8_2.4?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.13-6.el8_2.4?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686", "product": { "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686", "product_id": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.13-6.el8_2.4?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "product": { "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "product_id": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.13-6.el8_2.4?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.13-6.el8_2.4.i686", "product": { "name": "bind-export-devel-32:9.11.13-6.el8_2.4.i686", "product_id": "bind-export-devel-32:9.11.13-6.el8_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.13-6.el8_2.4?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.13-6.el8_2.4.i686", "product": { "name": "bind-export-libs-32:9.11.13-6.el8_2.4.i686", "product_id": "bind-export-libs-32:9.11.13-6.el8_2.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.13-6.el8_2.4?arch=i686\u0026epoch=32" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-chroot-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-chroot-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-devel-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-devel-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-libs-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-libs-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-libs-lite-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-lite-devel-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-pkcs11-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-pkcs11-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-sdb-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-sdb-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-utils-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-utils-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-debugsource-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-debugsource-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-export-devel-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-export-devel-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.13-6.el8_2.4.s390x", "product": { "name": "bind-export-libs-32:9.11.13-6.el8_2.4.s390x", "product_id": "bind-export-libs-32:9.11.13-6.el8_2.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.13-6.el8_2.4?arch=s390x\u0026epoch=32" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "bind-license-32:9.11.13-6.el8_2.4.noarch", "product": { "name": "bind-license-32:9.11.13-6.el8_2.4.noarch", "product_id": "bind-license-32:9.11.13-6.el8_2.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-license@9.11.13-6.el8_2.4?arch=noarch\u0026epoch=32" } } }, { "category": "product_version", "name": "python3-bind-32:9.11.13-6.el8_2.4.noarch", "product": { "name": "python3-bind-32:9.11.13-6.el8_2.4.noarch", "product_id": "python3-bind-32:9.11.13-6.el8_2.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-bind@9.11.13-6.el8_2.4?arch=noarch\u0026epoch=32" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.13-6.el8_2.4.src", "product": { "name": "bind-32:9.11.13-6.el8_2.4.src", "product_id": "bind-32:9.11.13-6.el8_2.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.13-6.el8_2.4?arch=src\u0026epoch=32" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.13-6.el8_2.4.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.src" }, "product_reference": "bind-32:9.11.13-6.el8_2.4.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-chroot-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-chroot-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-chroot-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-chroot-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-debuginfo-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-debuginfo-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-debugsource-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-debugsource-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-debugsource-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-debugsource-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-devel-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-devel-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-devel-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-devel-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-devel-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-export-devel-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-export-devel-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-export-devel-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-export-devel-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-export-libs-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-export-libs-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-export-libs-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-export-libs-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-libs-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-libs-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-libs-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-libs-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-libs-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-libs-lite-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-libs-lite-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-license-32:9.11.13-6.el8_2.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-license-32:9.11.13-6.el8_2.4.noarch" }, "product_reference": "bind-license-32:9.11.13-6.el8_2.4.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-lite-devel-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-lite-devel-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-pkcs11-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-sdb-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-sdb-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-sdb-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-sdb-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-utils-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-utils-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-utils-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-utils-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-bind-32:9.11.13-6.el8_2.4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:python3-bind-32:9.11.13-6.el8_2.4.noarch" }, "product_reference": "python3-bind-32:9.11.13-6.el8_2.4.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.13-6.el8_2.4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.src" }, "product_reference": "bind-32:9.11.13-6.el8_2.4.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-chroot-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-chroot-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-chroot-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-chroot-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-debuginfo-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-debuginfo-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-debugsource-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-debugsource-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-debugsource-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-debugsource-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-devel-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-devel-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-devel-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-devel-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-devel-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-export-devel-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-export-devel-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-export-devel-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-export-devel-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-export-libs-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-export-libs-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-export-libs-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-export-libs-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-libs-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-libs-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-libs-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-libs-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-libs-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-libs-lite-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-libs-lite-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-license-32:9.11.13-6.el8_2.4.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-license-32:9.11.13-6.el8_2.4.noarch" }, "product_reference": "bind-license-32:9.11.13-6.el8_2.4.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-lite-devel-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-lite-devel-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-pkcs11-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-sdb-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-sdb-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-sdb-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-sdb-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-utils-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-utils-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-utils-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-utils-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64" }, "product_reference": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686" }, "product_reference": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le" }, "product_reference": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x" }, "product_reference": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64" }, "product_reference": "bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-bind-32:9.11.13-6.el8_2.4.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:python3-bind-32:9.11.13-6.el8_2.4.noarch" }, "product_reference": "python3-bind-32:9.11.13-6.el8_2.4.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Maksym Odinintsev" ] } ], "cve": "CVE-2022-38177", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128601" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Bind package. By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: memory leak in ECDSA DNSSEC verification code", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects versions 9.8.4 -\u003e 9.16.32 of the Bind package, therefore Red Hat Enterprise Linux 6 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.src", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-license-32:9.11.13-6.el8_2.4.noarch", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:python3-bind-32:9.11.13-6.el8_2.4.noarch", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.src", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-license-32:9.11.13-6.el8_2.4.noarch", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:python3-bind-32:9.11.13-6.el8_2.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38177" }, { "category": "external", "summary": "RHBZ#2128601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38177", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38177" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-38177", "url": "https://kb.isc.org/docs/cve-2022-38177" } ], "release_date": "2022-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-04T16:06:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, the BIND daemon (named) will be restarted automatically.", "product_ids": [ "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.src", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-license-32:9.11.13-6.el8_2.4.noarch", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:python3-bind-32:9.11.13-6.el8_2.4.noarch", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.src", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-license-32:9.11.13-6.el8_2.4.noarch", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:python3-bind-32:9.11.13-6.el8_2.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6780" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.src", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-license-32:9.11.13-6.el8_2.4.noarch", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:python3-bind-32:9.11.13-6.el8_2.4.noarch", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.src", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-license-32:9.11.13-6.el8_2.4.noarch", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:python3-bind-32:9.11.13-6.el8_2.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: memory leak in ECDSA DNSSEC verification code" }, { "acknowledgments": [ { "names": [ "Maksym Odinintsev" ] } ], "cve": "CVE-2022-38178", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128602" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Bind package, where the DNSSEC verification code for the EdDSA algorithm leaks memory when there is a signature length mismatch. By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: memory leaks in EdDSA DNSSEC verification code", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects versions 9.9.12 -\u003e 9.16.32 of the Bind package, therefore Red Hat Enterprise Linux 6 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.src", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-license-32:9.11.13-6.el8_2.4.noarch", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:python3-bind-32:9.11.13-6.el8_2.4.noarch", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.src", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-license-32:9.11.13-6.el8_2.4.noarch", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:python3-bind-32:9.11.13-6.el8_2.4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38178" }, { "category": "external", "summary": "RHBZ#2128602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38178", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38178" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38178", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38178" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-38178", "url": "https://kb.isc.org/docs/cve-2022-38178" } ], "release_date": "2022-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-04T16:06:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, the BIND daemon (named) will be restarted automatically.", "product_ids": [ "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.src", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-license-32:9.11.13-6.el8_2.4.noarch", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:python3-bind-32:9.11.13-6.el8_2.4.noarch", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.src", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-license-32:9.11.13-6.el8_2.4.noarch", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:python3-bind-32:9.11.13-6.el8_2.4.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6780" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.src", "AppStream-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-license-32:9.11.13-6.el8_2.4.noarch", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "AppStream-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "AppStream-8.2.0.Z.EUS:python3-bind-32:9.11.13-6.el8_2.4.noarch", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.src", "BaseOS-8.2.0.Z.EUS:bind-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-chroot-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-debugsource-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-export-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-export-libs-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-license-32:9.11.13-6.el8_2.4.noarch", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-lite-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-devel-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-sdb-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-sdb-chroot-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-sdb-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-utils-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.aarch64", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.i686", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.ppc64le", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.s390x", "BaseOS-8.2.0.Z.EUS:bind-utils-debuginfo-32:9.11.13-6.el8_2.4.x86_64", "BaseOS-8.2.0.Z.EUS:python3-bind-32:9.11.13-6.el8_2.4.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: memory leaks in EdDSA DNSSEC verification code" } ] }
rhsa-2022_6763
Vulnerability from csaf_redhat
Published
2022-10-03 16:04
Modified
2024-11-22 20:23
Summary
Red Hat Security Advisory: bind security update
Notes
Topic
An update for bind is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly (CVE-2022-3080)
* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)
* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for bind is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.\n\nSecurity Fix(es):\n\n* bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly (CVE-2022-3080)\n\n* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)\n\n* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6763", "url": "https://access.redhat.com/errata/RHSA-2022:6763" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2128600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128600" }, { "category": "external", "summary": "2128601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601" }, { "category": "external", "summary": "2128602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6763.json" } ], "title": "Red Hat Security Advisory: bind security update", "tracking": { "current_release_date": "2024-11-22T20:23:35+00:00", "generator": { "date": "2024-11-22T20:23:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:6763", "initial_release_date": "2022-10-03T16:04:51+00:00", "revision_history": [ { "date": "2022-10-03T16:04:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-10-03T16:04:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T20:23:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 9)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bind-devel-32:9.16.23-1.el9_0.1.aarch64", "product": { "name": "bind-devel-32:9.16.23-1.el9_0.1.aarch64", "product_id": "bind-devel-32:9.16.23-1.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.16.23-1.el9_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "product": { "name": "bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "product_id": "bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.16.23-1.el9_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "product": { "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "product_id": "bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.16.23-1.el9_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "product": { "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "product_id": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-dnssec-utils-debuginfo@9.16.23-1.el9_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "product": { "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "product_id": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.16.23-1.el9_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "product": { "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "product_id": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.16.23-1.el9_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-32:9.16.23-1.el9_0.1.aarch64", "product": { "name": "bind-32:9.16.23-1.el9_0.1.aarch64", "product_id": "bind-32:9.16.23-1.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.16.23-1.el9_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "product": { "name": "bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "product_id": "bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.16.23-1.el9_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "product": { "name": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "product_id": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-dnssec-utils@9.16.23-1.el9_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.16.23-1.el9_0.1.aarch64", "product": { "name": "bind-libs-32:9.16.23-1.el9_0.1.aarch64", "product_id": "bind-libs-32:9.16.23-1.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.16.23-1.el9_0.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.16.23-1.el9_0.1.aarch64", "product": { "name": "bind-utils-32:9.16.23-1.el9_0.1.aarch64", "product_id": "bind-utils-32:9.16.23-1.el9_0.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.16.23-1.el9_0.1?arch=aarch64\u0026epoch=32" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "product": { "name": "bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "product_id": "bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.16.23-1.el9_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "product": { "name": "bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "product_id": "bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.16.23-1.el9_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "product": { "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "product_id": "bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.16.23-1.el9_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "product": { "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "product_id": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-dnssec-utils-debuginfo@9.16.23-1.el9_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "product": { "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "product_id": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.16.23-1.el9_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "product": { "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "product_id": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.16.23-1.el9_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-32:9.16.23-1.el9_0.1.ppc64le", "product": { "name": "bind-32:9.16.23-1.el9_0.1.ppc64le", "product_id": "bind-32:9.16.23-1.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.16.23-1.el9_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "product": { "name": "bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "product_id": "bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.16.23-1.el9_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "product": { "name": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "product_id": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-dnssec-utils@9.16.23-1.el9_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "product": { "name": "bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "product_id": "bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.16.23-1.el9_0.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "product": { "name": "bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "product_id": "bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.16.23-1.el9_0.1?arch=ppc64le\u0026epoch=32" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bind-devel-32:9.16.23-1.el9_0.1.i686", "product": { "name": "bind-devel-32:9.16.23-1.el9_0.1.i686", "product_id": "bind-devel-32:9.16.23-1.el9_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.16.23-1.el9_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.16.23-1.el9_0.1.i686", "product": { "name": "bind-libs-32:9.16.23-1.el9_0.1.i686", "product_id": "bind-libs-32:9.16.23-1.el9_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.16.23-1.el9_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.16.23-1.el9_0.1.i686", "product": { "name": "bind-debugsource-32:9.16.23-1.el9_0.1.i686", "product_id": "bind-debugsource-32:9.16.23-1.el9_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.16.23-1.el9_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "product": { "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "product_id": "bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.16.23-1.el9_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "product": { "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "product_id": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-dnssec-utils-debuginfo@9.16.23-1.el9_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "product": { "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "product_id": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.16.23-1.el9_0.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "product": { "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "product_id": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.16.23-1.el9_0.1?arch=i686\u0026epoch=32" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "bind-devel-32:9.16.23-1.el9_0.1.x86_64", "product": { "name": "bind-devel-32:9.16.23-1.el9_0.1.x86_64", "product_id": "bind-devel-32:9.16.23-1.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.16.23-1.el9_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "product": { "name": "bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "product_id": "bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.16.23-1.el9_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "product": { "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "product_id": "bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.16.23-1.el9_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "product": { "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "product_id": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-dnssec-utils-debuginfo@9.16.23-1.el9_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "product": { "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "product_id": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.16.23-1.el9_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "product": { "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "product_id": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.16.23-1.el9_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-32:9.16.23-1.el9_0.1.x86_64", "product": { "name": "bind-32:9.16.23-1.el9_0.1.x86_64", "product_id": "bind-32:9.16.23-1.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.16.23-1.el9_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "product": { "name": "bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "product_id": "bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.16.23-1.el9_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "product": { "name": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "product_id": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-dnssec-utils@9.16.23-1.el9_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.16.23-1.el9_0.1.x86_64", "product": { "name": "bind-libs-32:9.16.23-1.el9_0.1.x86_64", "product_id": "bind-libs-32:9.16.23-1.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.16.23-1.el9_0.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.16.23-1.el9_0.1.x86_64", "product": { "name": "bind-utils-32:9.16.23-1.el9_0.1.x86_64", "product_id": "bind-utils-32:9.16.23-1.el9_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.16.23-1.el9_0.1?arch=x86_64\u0026epoch=32" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bind-devel-32:9.16.23-1.el9_0.1.s390x", "product": { "name": "bind-devel-32:9.16.23-1.el9_0.1.s390x", "product_id": "bind-devel-32:9.16.23-1.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.16.23-1.el9_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "product": { "name": "bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "product_id": "bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.16.23-1.el9_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "product": { "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "product_id": "bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.16.23-1.el9_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "product": { "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "product_id": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-dnssec-utils-debuginfo@9.16.23-1.el9_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "product": { "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "product_id": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.16.23-1.el9_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "product": { "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "product_id": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.16.23-1.el9_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-32:9.16.23-1.el9_0.1.s390x", "product": { "name": "bind-32:9.16.23-1.el9_0.1.s390x", "product_id": "bind-32:9.16.23-1.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.16.23-1.el9_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.16.23-1.el9_0.1.s390x", "product": { "name": "bind-chroot-32:9.16.23-1.el9_0.1.s390x", "product_id": "bind-chroot-32:9.16.23-1.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.16.23-1.el9_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "product": { "name": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "product_id": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-dnssec-utils@9.16.23-1.el9_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.16.23-1.el9_0.1.s390x", "product": { "name": "bind-libs-32:9.16.23-1.el9_0.1.s390x", "product_id": "bind-libs-32:9.16.23-1.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.16.23-1.el9_0.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.16.23-1.el9_0.1.s390x", "product": { "name": "bind-utils-32:9.16.23-1.el9_0.1.s390x", "product_id": "bind-utils-32:9.16.23-1.el9_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.16.23-1.el9_0.1?arch=s390x\u0026epoch=32" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.16.23-1.el9_0.1.src", "product": { "name": "bind-32:9.16.23-1.el9_0.1.src", "product_id": "bind-32:9.16.23-1.el9_0.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.16.23-1.el9_0.1?arch=src\u0026epoch=32" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "product": { "name": "bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "product_id": "bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-dnssec-doc@9.16.23-1.el9_0.1?arch=noarch\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-license-32:9.16.23-1.el9_0.1.noarch", "product": { "name": "bind-license-32:9.16.23-1.el9_0.1.noarch", "product_id": "bind-license-32:9.16.23-1.el9_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-license@9.16.23-1.el9_0.1?arch=noarch\u0026epoch=32" } } }, { "category": "product_version", "name": "python3-bind-32:9.16.23-1.el9_0.1.noarch", "product": { "name": "python3-bind-32:9.16.23-1.el9_0.1.noarch", "product_id": "python3-bind-32:9.16.23-1.el9_0.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-bind@9.16.23-1.el9_0.1?arch=noarch\u0026epoch=32" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.16.23-1.el9_0.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src" }, "product_reference": "bind-32:9.16.23-1.el9_0.1.src", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-chroot-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686" }, "product_reference": "bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.16.23-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686" }, "product_reference": "bind-debugsource-32:9.16.23-1.el9_0.1.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-devel-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.16.23-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686" }, "product_reference": "bind-devel-32:9.16.23-1.el9_0.1.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-devel-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-devel-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch" }, "product_reference": "bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686" }, "product_reference": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-libs-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.16.23-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686" }, "product_reference": "bind-libs-32:9.16.23-1.el9_0.1.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-libs-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-libs-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686" }, "product_reference": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-license-32:9.16.23-1.el9_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch" }, "product_reference": "bind-license-32:9.16.23-1.el9_0.1.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-utils-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-utils-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-utils-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686" }, "product_reference": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-bind-32:9.16.23-1.el9_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch" }, "product_reference": "python3-bind-32:9.16.23-1.el9_0.1.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.16.23-1.el9_0.1.src as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src" }, "product_reference": "bind-32:9.16.23-1.el9_0.1.src", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-chroot-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686" }, "product_reference": "bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.16.23-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686" }, "product_reference": "bind-debugsource-32:9.16.23-1.el9_0.1.i686", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-devel-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.16.23-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686" }, "product_reference": "bind-devel-32:9.16.23-1.el9_0.1.i686", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-devel-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-devel-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch" }, "product_reference": "bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686" }, "product_reference": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-libs-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.16.23-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686" }, "product_reference": "bind-libs-32:9.16.23-1.el9_0.1.i686", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-libs-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-libs-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686" }, "product_reference": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-license-32:9.16.23-1.el9_0.1.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch" }, "product_reference": "bind-license-32:9.16.23-1.el9_0.1.noarch", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-utils-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-utils-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-utils-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64" }, "product_reference": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686" }, "product_reference": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le" }, "product_reference": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x" }, "product_reference": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64" }, "product_reference": "bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-bind-32:9.16.23-1.el9_0.1.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch" }, "product_reference": "python3-bind-32:9.16.23-1.el9_0.1.noarch", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Maksym Odinintsev" ] } ], "cve": "CVE-2022-3080", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128600" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Bind package, where the resolver can crash when stale cache and stale answers are enabled, option stale-answer-client-timeout is set to 0 and there is a stale CNAME in the cache for an incoming query. By sending specific queries to the resolver, an attacker can cause named to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects versions 9.16.14 and higher of the Bind package. Therefore Red Hat Enterprise Linux 6 and 7 are not impacted.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3080" }, { "category": "external", "summary": "RHBZ#2128600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3080", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3080" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-3080", "url": "https://kb.isc.org/docs/cve-2022-3080" } ], "release_date": "2022-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-03T16:04:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, the BIND daemon (named) will be restarted automatically.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6763" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly" }, { "acknowledgments": [ { "names": [ "Maksym Odinintsev" ] } ], "cve": "CVE-2022-38177", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128601" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Bind package. By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: memory leak in ECDSA DNSSEC verification code", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects versions 9.8.4 -\u003e 9.16.32 of the Bind package, therefore Red Hat Enterprise Linux 6 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38177" }, { "category": "external", "summary": "RHBZ#2128601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38177", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38177" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-38177", "url": "https://kb.isc.org/docs/cve-2022-38177" } ], "release_date": "2022-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-03T16:04:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, the BIND daemon (named) will be restarted automatically.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6763" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: memory leak in ECDSA DNSSEC verification code" }, { "acknowledgments": [ { "names": [ "Maksym Odinintsev" ] } ], "cve": "CVE-2022-38178", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128602" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Bind package, where the DNSSEC verification code for the EdDSA algorithm leaks memory when there is a signature length mismatch. By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: memory leaks in EdDSA DNSSEC verification code", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects versions 9.9.12 -\u003e 9.16.32 of the Bind package, therefore Red Hat Enterprise Linux 6 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38178" }, { "category": "external", "summary": "RHBZ#2128602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38178", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38178" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38178", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38178" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-38178", "url": "https://kb.isc.org/docs/cve-2022-38178" } ], "release_date": "2022-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-03T16:04:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, the BIND daemon (named) will be restarted automatically.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6763" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src", "AppStream-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.src", "CRB-9.0.0.Z.MAIN.EUS:bind-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-chroot-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-debugsource-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-devel-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-doc-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-dnssec-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-license-32:9.16.23-1.el9_0.1.noarch", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.i686", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.s390x", "CRB-9.0.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.16.23-1.el9_0.1.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-bind-32:9.16.23-1.el9_0.1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: memory leaks in EdDSA DNSSEC verification code" } ] }
rhsa-2022_6764
Vulnerability from csaf_redhat
Published
2022-10-03 15:30
Modified
2024-11-22 20:20
Summary
Red Hat Security Advisory: bind security update
Notes
Topic
An update for bind is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)
* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for bind is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.\n\nSecurity Fix(es):\n\n* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)\n\n* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6764", "url": "https://access.redhat.com/errata/RHSA-2022:6764" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2128601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601" }, { "category": "external", "summary": "2128602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6764.json" } ], "title": "Red Hat Security Advisory: bind security update", "tracking": { "current_release_date": "2024-11-22T20:20:50+00:00", "generator": { "date": "2024-11-22T20:20:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:6764", "initial_release_date": "2022-10-03T15:30:18+00:00", "revision_history": [ { "date": "2022-10-03T15:30:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-10-03T15:30:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T20:20:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.1::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "product": { "name": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_id": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.4-26.P2.el8_1.6?arch=ppc64le\u0026epoch=32" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "product": { "name": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "product_id": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.4-26.P2.el8_1.6?arch=x86_64\u0026epoch=32" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bind-devel-32:9.11.4-26.P2.el8_1.6.i686", "product": { "name": "bind-devel-32:9.11.4-26.P2.el8_1.6.i686", "product_id": "bind-devel-32:9.11.4-26.P2.el8_1.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.4-26.P2.el8_1.6?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.4-26.P2.el8_1.6.i686", "product": { "name": "bind-libs-32:9.11.4-26.P2.el8_1.6.i686", "product_id": "bind-libs-32:9.11.4-26.P2.el8_1.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.4-26.P2.el8_1.6?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686", "product": { "name": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686", "product_id": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.4-26.P2.el8_1.6?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686", "product": { "name": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686", "product_id": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.4-26.P2.el8_1.6?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686", "product": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686", "product_id": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.4-26.P2.el8_1.6?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686", "product": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686", "product_id": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.4-26.P2.el8_1.6?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686", "product": { "name": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686", "product_id": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.4-26.P2.el8_1.6?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product": { "name": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product_id": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.4-26.P2.el8_1.6?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product": { "name": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product_id": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.4-26.P2.el8_1.6?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product": { "name": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product_id": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.4-26.P2.el8_1.6?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product_id": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.4-26.P2.el8_1.6?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product_id": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.4-26.P2.el8_1.6?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.4-26.P2.el8_1.6?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.4-26.P2.el8_1.6?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product": { "name": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product_id": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.4-26.P2.el8_1.6?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product": { "name": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product_id": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.4-26.P2.el8_1.6?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686", "product": { "name": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686", "product_id": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.4-26.P2.el8_1.6?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686", "product": { "name": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686", "product_id": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.4-26.P2.el8_1.6?arch=i686\u0026epoch=32" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "bind-license-32:9.11.4-26.P2.el8_1.6.noarch", "product": { "name": "bind-license-32:9.11.4-26.P2.el8_1.6.noarch", "product_id": "bind-license-32:9.11.4-26.P2.el8_1.6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-license@9.11.4-26.P2.el8_1.6?arch=noarch\u0026epoch=32" } } }, { "category": "product_version", "name": "python3-bind-32:9.11.4-26.P2.el8_1.6.noarch", "product": { "name": "python3-bind-32:9.11.4-26.P2.el8_1.6.noarch", "product_id": "python3-bind-32:9.11.4-26.P2.el8_1.6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-bind@9.11.4-26.P2.el8_1.6?arch=noarch\u0026epoch=32" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.4-26.P2.el8_1.6.src", "product": { "name": "bind-32:9.11.4-26.P2.el8_1.6.src", "product_id": "bind-32:9.11.4-26.P2.el8_1.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.4-26.P2.el8_1.6?arch=src\u0026epoch=32" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el8_1.6.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.src" }, "product_reference": "bind-32:9.11.4-26.P2.el8_1.6.src", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-license-32:9.11.4-26.P2.el8_1.6.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-license-32:9.11.4-26.P2.el8_1.6.noarch" }, "product_reference": "bind-license-32:9.11.4-26.P2.el8_1.6.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-bind-32:9.11.4-26.P2.el8_1.6.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:python3-bind-32:9.11.4-26.P2.el8_1.6.noarch" }, "product_reference": "python3-bind-32:9.11.4-26.P2.el8_1.6.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el8_1.6.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.src" }, "product_reference": "bind-32:9.11.4-26.P2.el8_1.6.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-license-32:9.11.4-26.P2.el8_1.6.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-license-32:9.11.4-26.P2.el8_1.6.noarch" }, "product_reference": "bind-license-32:9.11.4-26.P2.el8_1.6.noarch", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686" }, "product_reference": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le" }, "product_reference": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64" }, "product_reference": "bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-bind-32:9.11.4-26.P2.el8_1.6.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:python3-bind-32:9.11.4-26.P2.el8_1.6.noarch" }, "product_reference": "python3-bind-32:9.11.4-26.P2.el8_1.6.noarch", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Maksym Odinintsev" ] } ], "cve": "CVE-2022-38177", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128601" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Bind package. By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: memory leak in ECDSA DNSSEC verification code", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects versions 9.8.4 -\u003e 9.16.32 of the Bind package, therefore Red Hat Enterprise Linux 6 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.src", "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-license-32:9.11.4-26.P2.el8_1.6.noarch", "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:python3-bind-32:9.11.4-26.P2.el8_1.6.noarch", "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.src", "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-license-32:9.11.4-26.P2.el8_1.6.noarch", "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:python3-bind-32:9.11.4-26.P2.el8_1.6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38177" }, { "category": "external", "summary": "RHBZ#2128601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38177", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38177" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-38177", "url": "https://kb.isc.org/docs/cve-2022-38177" } ], "release_date": "2022-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-03T15:30:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, the BIND daemon (named) will be restarted automatically.", "product_ids": [ "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.src", "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-license-32:9.11.4-26.P2.el8_1.6.noarch", "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:python3-bind-32:9.11.4-26.P2.el8_1.6.noarch", "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.src", "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-license-32:9.11.4-26.P2.el8_1.6.noarch", "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:python3-bind-32:9.11.4-26.P2.el8_1.6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6764" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.src", "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-license-32:9.11.4-26.P2.el8_1.6.noarch", "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:python3-bind-32:9.11.4-26.P2.el8_1.6.noarch", "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.src", "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-license-32:9.11.4-26.P2.el8_1.6.noarch", "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:python3-bind-32:9.11.4-26.P2.el8_1.6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: memory leak in ECDSA DNSSEC verification code" }, { "acknowledgments": [ { "names": [ "Maksym Odinintsev" ] } ], "cve": "CVE-2022-38178", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128602" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Bind package, where the DNSSEC verification code for the EdDSA algorithm leaks memory when there is a signature length mismatch. By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: memory leaks in EdDSA DNSSEC verification code", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects versions 9.9.12 -\u003e 9.16.32 of the Bind package, therefore Red Hat Enterprise Linux 6 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.src", "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-license-32:9.11.4-26.P2.el8_1.6.noarch", "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:python3-bind-32:9.11.4-26.P2.el8_1.6.noarch", "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.src", "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-license-32:9.11.4-26.P2.el8_1.6.noarch", "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:python3-bind-32:9.11.4-26.P2.el8_1.6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38178" }, { "category": "external", "summary": "RHBZ#2128602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38178", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38178" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38178", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38178" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-38178", "url": "https://kb.isc.org/docs/cve-2022-38178" } ], "release_date": "2022-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-03T15:30:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, the BIND daemon (named) will be restarted automatically.", "product_ids": [ "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.src", "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-license-32:9.11.4-26.P2.el8_1.6.noarch", "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:python3-bind-32:9.11.4-26.P2.el8_1.6.noarch", "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.src", "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-license-32:9.11.4-26.P2.el8_1.6.noarch", "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:python3-bind-32:9.11.4-26.P2.el8_1.6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6764" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.src", "AppStream-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-license-32:9.11.4-26.P2.el8_1.6.noarch", "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "AppStream-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "AppStream-8.1.0.Z.E4S:python3-bind-32:9.11.4-26.P2.el8_1.6.noarch", "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.src", "BaseOS-8.1.0.Z.E4S:bind-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-debugsource-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-export-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-export-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-export-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-libs-lite-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-license-32:9.11.4-26.P2.el8_1.6.noarch", "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-lite-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-devel-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-libs-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-pkcs11-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-sdb-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-sdb-chroot-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-sdb-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-utils-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.i686", "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.ppc64le", "BaseOS-8.1.0.Z.E4S:bind-utils-debuginfo-32:9.11.4-26.P2.el8_1.6.x86_64", "BaseOS-8.1.0.Z.E4S:python3-bind-32:9.11.4-26.P2.el8_1.6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: memory leaks in EdDSA DNSSEC verification code" } ] }
rhsa-2022_6778
Vulnerability from csaf_redhat
Published
2022-10-04 15:45
Modified
2024-11-22 20:21
Summary
Red Hat Security Advisory: bind security update
Notes
Topic
An update for bind is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)
* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for bind is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.\n\nSecurity Fix(es):\n\n* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)\n\n* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6778", "url": "https://access.redhat.com/errata/RHSA-2022:6778" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2128601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601" }, { "category": "external", "summary": "2128602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6778.json" } ], "title": "Red Hat Security Advisory: bind security update", "tracking": { "current_release_date": "2024-11-22T20:21:19+00:00", "generator": { "date": "2024-11-22T20:21:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:6778", "initial_release_date": "2022-10-04T15:45:18+00:00", "revision_history": [ { "date": "2022-10-04T15:45:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-10-04T15:45:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T20:21:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-chroot-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-chroot-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-devel-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-devel-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-libs-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-libs-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-sdb-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-sdb-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-utils-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-utils-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-debugsource-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-debugsource-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-export-devel-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-export-devel-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.36-3.el8_6.1.aarch64", "product": { "name": "bind-export-libs-32:9.11.36-3.el8_6.1.aarch64", "product_id": "bind-export-libs-32:9.11.36-3.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.36-3.el8_6.1?arch=aarch64\u0026epoch=32" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-chroot-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-chroot-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-devel-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-devel-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-libs-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-libs-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-sdb-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-sdb-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-utils-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-utils-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le", "product": { "name": "bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le", "product_id": "bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.36-3.el8_6.1?arch=ppc64le\u0026epoch=32" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-chroot-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-chroot-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-devel-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-devel-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-libs-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-libs-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-sdb-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-sdb-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-utils-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-utils-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-debugsource-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-debugsource-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-export-devel-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-export-devel-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.36-3.el8_6.1.x86_64", "product": { "name": "bind-export-libs-32:9.11.36-3.el8_6.1.x86_64", "product_id": "bind-export-libs-32:9.11.36-3.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.36-3.el8_6.1?arch=x86_64\u0026epoch=32" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bind-devel-32:9.11.36-3.el8_6.1.i686", "product": { "name": "bind-devel-32:9.11.36-3.el8_6.1.i686", "product_id": "bind-devel-32:9.11.36-3.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.36-3.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.36-3.el8_6.1.i686", "product": { "name": "bind-libs-32:9.11.36-3.el8_6.1.i686", "product_id": "bind-libs-32:9.11.36-3.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.36-3.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.i686", "product": { "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.i686", "product_id": "bind-libs-lite-32:9.11.36-3.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.36-3.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.i686", "product": { "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.i686", "product_id": "bind-lite-devel-32:9.11.36-3.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.36-3.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686", "product": { "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686", "product_id": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.36-3.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686", "product": { "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686", "product_id": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.36-3.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.36-3.el8_6.1.i686", "product": { "name": "bind-debugsource-32:9.11.36-3.el8_6.1.i686", "product_id": "bind-debugsource-32:9.11.36-3.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.36-3.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.i686", "product": { "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.i686", "product_id": "bind-debuginfo-32:9.11.36-3.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.36-3.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "product": { "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "product_id": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.36-3.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "product": { "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "product_id": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.36-3.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686", "product_id": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.36-3.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686", "product_id": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.36-3.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.36-3.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.36-3.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686", "product": { "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686", "product_id": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.36-3.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "product": { "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "product_id": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.36-3.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.36-3.el8_6.1.i686", "product": { "name": "bind-export-devel-32:9.11.36-3.el8_6.1.i686", "product_id": "bind-export-devel-32:9.11.36-3.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.36-3.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.36-3.el8_6.1.i686", "product": { "name": "bind-export-libs-32:9.11.36-3.el8_6.1.i686", "product_id": "bind-export-libs-32:9.11.36-3.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.36-3.el8_6.1?arch=i686\u0026epoch=32" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-chroot-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-chroot-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-devel-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-devel-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-libs-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-libs-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-libs-lite-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-lite-devel-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-pkcs11-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-pkcs11-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-sdb-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-sdb-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-utils-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-utils-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-debugsource-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-debugsource-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-export-devel-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-export-devel-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.36-3.el8_6.1.s390x", "product": { "name": "bind-export-libs-32:9.11.36-3.el8_6.1.s390x", "product_id": "bind-export-libs-32:9.11.36-3.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.36-3.el8_6.1?arch=s390x\u0026epoch=32" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "bind-license-32:9.11.36-3.el8_6.1.noarch", "product": { "name": "bind-license-32:9.11.36-3.el8_6.1.noarch", "product_id": "bind-license-32:9.11.36-3.el8_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-license@9.11.36-3.el8_6.1?arch=noarch\u0026epoch=32" } } }, { "category": "product_version", "name": "python3-bind-32:9.11.36-3.el8_6.1.noarch", "product": { "name": "python3-bind-32:9.11.36-3.el8_6.1.noarch", "product_id": "python3-bind-32:9.11.36-3.el8_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-bind@9.11.36-3.el8_6.1?arch=noarch\u0026epoch=32" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.36-3.el8_6.1.src", "product": { "name": "bind-32:9.11.36-3.el8_6.1.src", "product_id": "bind-32:9.11.36-3.el8_6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.36-3.el8_6.1?arch=src\u0026epoch=32" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.36-3.el8_6.1.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.src" }, "product_reference": "bind-32:9.11.36-3.el8_6.1.src", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-chroot-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-chroot-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-chroot-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-chroot-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-debuginfo-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-debuginfo-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-debugsource-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-debugsource-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-debugsource-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-debugsource-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-devel-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-devel-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-devel-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-devel-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-devel-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-export-devel-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-export-devel-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-export-devel-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-export-devel-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-export-libs-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-export-libs-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-export-libs-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-export-libs-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-libs-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-libs-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-libs-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-libs-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-libs-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-libs-lite-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-libs-lite-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-license-32:9.11.36-3.el8_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-license-32:9.11.36-3.el8_6.1.noarch" }, "product_reference": "bind-license-32:9.11.36-3.el8_6.1.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-lite-devel-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-lite-devel-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-pkcs11-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-sdb-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-sdb-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-sdb-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-sdb-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-utils-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-utils-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-utils-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-utils-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-bind-32:9.11.36-3.el8_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:python3-bind-32:9.11.36-3.el8_6.1.noarch" }, "product_reference": "python3-bind-32:9.11.36-3.el8_6.1.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.36-3.el8_6.1.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.src" }, "product_reference": "bind-32:9.11.36-3.el8_6.1.src", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-chroot-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-chroot-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-chroot-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-chroot-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-debuginfo-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-debuginfo-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-debugsource-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-debugsource-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-debugsource-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-debugsource-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-devel-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-devel-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-devel-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-devel-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-devel-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-export-devel-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-export-devel-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-export-devel-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-export-devel-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-export-libs-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-export-libs-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-export-libs-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-export-libs-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-libs-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-libs-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-libs-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-libs-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-libs-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-libs-lite-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-libs-lite-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-license-32:9.11.36-3.el8_6.1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-license-32:9.11.36-3.el8_6.1.noarch" }, "product_reference": "bind-license-32:9.11.36-3.el8_6.1.noarch", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-lite-devel-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-lite-devel-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-pkcs11-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-sdb-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-sdb-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-sdb-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-sdb-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-utils-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-utils-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-utils-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-utils-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64" }, "product_reference": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686" }, "product_reference": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le" }, "product_reference": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x" }, "product_reference": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64" }, "product_reference": "bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-bind-32:9.11.36-3.el8_6.1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-bind-32:9.11.36-3.el8_6.1.noarch" }, "product_reference": "python3-bind-32:9.11.36-3.el8_6.1.noarch", "relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Maksym Odinintsev" ] } ], "cve": "CVE-2022-38177", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128601" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Bind package. By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: memory leak in ECDSA DNSSEC verification code", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects versions 9.8.4 -\u003e 9.16.32 of the Bind package, therefore Red Hat Enterprise Linux 6 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.src", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-license-32:9.11.36-3.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:python3-bind-32:9.11.36-3.el8_6.1.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.src", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-license-32:9.11.36-3.el8_6.1.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:python3-bind-32:9.11.36-3.el8_6.1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38177" }, { "category": "external", "summary": "RHBZ#2128601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38177", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38177" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-38177", "url": "https://kb.isc.org/docs/cve-2022-38177" } ], "release_date": "2022-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-04T15:45:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, the BIND daemon (named) will be restarted automatically.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.src", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-license-32:9.11.36-3.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:python3-bind-32:9.11.36-3.el8_6.1.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.src", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-license-32:9.11.36-3.el8_6.1.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:python3-bind-32:9.11.36-3.el8_6.1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6778" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.src", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-license-32:9.11.36-3.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:python3-bind-32:9.11.36-3.el8_6.1.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.src", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-license-32:9.11.36-3.el8_6.1.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:python3-bind-32:9.11.36-3.el8_6.1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: memory leak in ECDSA DNSSEC verification code" }, { "acknowledgments": [ { "names": [ "Maksym Odinintsev" ] } ], "cve": "CVE-2022-38178", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128602" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Bind package, where the DNSSEC verification code for the EdDSA algorithm leaks memory when there is a signature length mismatch. By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: memory leaks in EdDSA DNSSEC verification code", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects versions 9.9.12 -\u003e 9.16.32 of the Bind package, therefore Red Hat Enterprise Linux 6 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.src", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-license-32:9.11.36-3.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:python3-bind-32:9.11.36-3.el8_6.1.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.src", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-license-32:9.11.36-3.el8_6.1.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:python3-bind-32:9.11.36-3.el8_6.1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38178" }, { "category": "external", "summary": "RHBZ#2128602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38178", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38178" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38178", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38178" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-38178", "url": "https://kb.isc.org/docs/cve-2022-38178" } ], "release_date": "2022-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-04T15:45:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, the BIND daemon (named) will be restarted automatically.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.src", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-license-32:9.11.36-3.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:python3-bind-32:9.11.36-3.el8_6.1.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.src", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-license-32:9.11.36-3.el8_6.1.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:python3-bind-32:9.11.36-3.el8_6.1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6778" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.src", "AppStream-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-license-32:9.11.36-3.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:python3-bind-32:9.11.36-3.el8_6.1.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.src", "BaseOS-8.6.0.Z.MAIN.EUS:bind-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-chroot-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-debugsource-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-export-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-libs-lite-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-license-32:9.11.36-3.el8_6.1.noarch", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-lite-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-devel-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-libs-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-pkcs11-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-chroot-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-sdb-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.aarch64", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.i686", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.ppc64le", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.s390x", "BaseOS-8.6.0.Z.MAIN.EUS:bind-utils-debuginfo-32:9.11.36-3.el8_6.1.x86_64", "BaseOS-8.6.0.Z.MAIN.EUS:python3-bind-32:9.11.36-3.el8_6.1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: memory leaks in EdDSA DNSSEC verification code" } ] }
rhsa-2022_6765
Vulnerability from csaf_redhat
Published
2022-10-03 15:35
Modified
2024-11-22 20:20
Summary
Red Hat Security Advisory: bind security update
Notes
Topic
An update for bind is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)
* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for bind is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.\n\nSecurity Fix(es):\n\n* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)\n\n* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6765", "url": "https://access.redhat.com/errata/RHSA-2022:6765" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2128601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601" }, { "category": "external", "summary": "2128602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6765.json" } ], "title": "Red Hat Security Advisory: bind security update", "tracking": { "current_release_date": "2024-11-22T20:20:41+00:00", "generator": { "date": "2024-11-22T20:20:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:6765", "initial_release_date": "2022-10-03T15:35:26+00:00", "revision_history": [ { "date": "2022-10-03T15:35:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-10-03T15:35:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T20:20:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.4-26.P2.el7_9.10.src", "product": { "name": "bind-32:9.11.4-26.P2.el7_9.10.src", "product_id": "bind-32:9.11.4-26.P2.el7_9.10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.4-26.P2.el7_9.10?arch=src\u0026epoch=32" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "product": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "product_id": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.4-26.P2.el7_9.10?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "product": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "product_id": "bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.4-26.P2.el7_9.10?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "product": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "product_id": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.4-26.P2.el7_9.10?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "product": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "product_id": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.4-26.P2.el7_9.10?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "product": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "product_id": "bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.4-26.P2.el7_9.10?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "product": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "product_id": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.4-26.P2.el7_9.10?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "product": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "product_id": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.4-26.P2.el7_9.10?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "product": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "product_id": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.4-26.P2.el7_9.10?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "product": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "product_id": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.4-26.P2.el7_9.10?arch=i686\u0026epoch=32" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "product": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "product_id": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.4-26.P2.el7_9.10?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "product": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "product_id": "bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.4-26.P2.el7_9.10?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "product": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "product_id": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.4-26.P2.el7_9.10?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "product": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "product_id": "bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.4-26.P2.el7_9.10?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "product": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "product_id": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.4-26.P2.el7_9.10?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-32:9.11.4-26.P2.el7_9.10.x86_64", "product": { "name": "bind-32:9.11.4-26.P2.el7_9.10.x86_64", "product_id": "bind-32:9.11.4-26.P2.el7_9.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.4-26.P2.el7_9.10?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "product": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "product_id": "bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.4-26.P2.el7_9.10?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "product": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "product_id": "bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.4-26.P2.el7_9.10?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "product": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "product_id": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.4-26.P2.el7_9.10?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "product": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "product_id": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.4-26.P2.el7_9.10?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "product": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "product_id": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.4-26.P2.el7_9.10?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "product": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "product_id": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.4-26.P2.el7_9.10?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "product": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "product_id": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.4-26.P2.el7_9.10?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "product": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "product_id": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.4-26.P2.el7_9.10?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "product": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "product_id": "bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.4-26.P2.el7_9.10?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "product": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "product_id": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.4-26.P2.el7_9.10?arch=x86_64\u0026epoch=32" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "product": { "name": "bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "product_id": "bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-license@9.11.4-26.P2.el7_9.10?arch=noarch\u0026epoch=32" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "product": { "name": "bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_id": "bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.4-26.P2.el7_9.10?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "product": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_id": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.4-26.P2.el7_9.10?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "product": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_id": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.4-26.P2.el7_9.10?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "product": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_id": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.4-26.P2.el7_9.10?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "product": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_id": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.4-26.P2.el7_9.10?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "product": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_id": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.4-26.P2.el7_9.10?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "product": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_id": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.4-26.P2.el7_9.10?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "product": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_id": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.4-26.P2.el7_9.10?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "product": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_id": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.4-26.P2.el7_9.10?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "product": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_id": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.4-26.P2.el7_9.10?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "product": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_id": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.4-26.P2.el7_9.10?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "product": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_id": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.4-26.P2.el7_9.10?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "product": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_id": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.4-26.P2.el7_9.10?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "product": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_id": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.4-26.P2.el7_9.10?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "product": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_id": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.4-26.P2.el7_9.10?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "product": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_id": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.4-26.P2.el7_9.10?arch=ppc64le\u0026epoch=32" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.4-26.P2.el7_9.10.ppc64", "product": { "name": "bind-32:9.11.4-26.P2.el7_9.10.ppc64", "product_id": "bind-32:9.11.4-26.P2.el7_9.10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.4-26.P2.el7_9.10?arch=ppc64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "product": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "product_id": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.4-26.P2.el7_9.10?arch=ppc64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "product": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "product_id": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.4-26.P2.el7_9.10?arch=ppc64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "product": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "product_id": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.4-26.P2.el7_9.10?arch=ppc64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "product": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "product_id": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.4-26.P2.el7_9.10?arch=ppc64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "product": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "product_id": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.4-26.P2.el7_9.10?arch=ppc64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "product": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "product_id": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.4-26.P2.el7_9.10?arch=ppc64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "product": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "product_id": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.4-26.P2.el7_9.10?arch=ppc64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "product": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "product_id": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.4-26.P2.el7_9.10?arch=ppc64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "product": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "product_id": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.4-26.P2.el7_9.10?arch=ppc64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "product": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "product_id": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.4-26.P2.el7_9.10?arch=ppc64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "product": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "product_id": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.4-26.P2.el7_9.10?arch=ppc64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "product": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "product_id": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.4-26.P2.el7_9.10?arch=ppc64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "product": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "product_id": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.4-26.P2.el7_9.10?arch=ppc64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "product": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "product_id": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.4-26.P2.el7_9.10?arch=ppc64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "product": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "product_id": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.4-26.P2.el7_9.10?arch=ppc64\u0026epoch=32" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "product": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "product_id": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.4-26.P2.el7_9.10?arch=ppc\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "product": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "product_id": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.4-26.P2.el7_9.10?arch=ppc\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "product": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "product_id": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.4-26.P2.el7_9.10?arch=ppc\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "product": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "product_id": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.4-26.P2.el7_9.10?arch=ppc\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "product": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "product_id": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.4-26.P2.el7_9.10?arch=ppc\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "product": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "product_id": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.4-26.P2.el7_9.10?arch=ppc\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "product": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "product_id": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.4-26.P2.el7_9.10?arch=ppc\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "product": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "product_id": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.4-26.P2.el7_9.10?arch=ppc\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "product": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "product_id": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.4-26.P2.el7_9.10?arch=ppc\u0026epoch=32" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.4-26.P2.el7_9.10.s390x", "product": { "name": "bind-32:9.11.4-26.P2.el7_9.10.s390x", "product_id": "bind-32:9.11.4-26.P2.el7_9.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.4-26.P2.el7_9.10?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "product": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "product_id": "bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.4-26.P2.el7_9.10?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "product": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "product_id": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.4-26.P2.el7_9.10?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "product": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "product_id": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.4-26.P2.el7_9.10?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "product": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "product_id": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.4-26.P2.el7_9.10?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "product": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "product_id": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.4-26.P2.el7_9.10?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "product": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "product_id": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.4-26.P2.el7_9.10?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "product": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "product_id": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.4-26.P2.el7_9.10?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "product": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "product_id": "bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.4-26.P2.el7_9.10?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "product": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "product_id": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.4-26.P2.el7_9.10?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "product": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "product_id": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.4-26.P2.el7_9.10?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "product": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "product_id": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.4-26.P2.el7_9.10?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "product": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "product_id": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.4-26.P2.el7_9.10?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "product": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "product_id": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.4-26.P2.el7_9.10?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "product": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "product_id": "bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.4-26.P2.el7_9.10?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "product": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "product_id": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.4-26.P2.el7_9.10?arch=s390x\u0026epoch=32" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "product": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "product_id": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.4-26.P2.el7_9.10?arch=s390\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "product": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "product_id": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.4-26.P2.el7_9.10?arch=s390\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "product": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "product_id": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.4-26.P2.el7_9.10?arch=s390\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "product": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "product_id": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.4-26.P2.el7_9.10?arch=s390\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "product": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "product_id": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.4-26.P2.el7_9.10?arch=s390\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "product": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "product_id": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.4-26.P2.el7_9.10?arch=s390\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "product": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "product_id": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.4-26.P2.el7_9.10?arch=s390\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "product": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "product_id": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.4-26.P2.el7_9.10?arch=s390\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "product": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "product_id": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.4-26.P2.el7_9.10?arch=s390\u0026epoch=32" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-license-32:9.11.4-26.P2.el7_9.10.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch" }, "product_reference": "bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-license-32:9.11.4-26.P2.el7_9.10.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch" }, "product_reference": "bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-license-32:9.11.4-26.P2.el7_9.10.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch" }, "product_reference": "bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-license-32:9.11.4-26.P2.el7_9.10.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch" }, "product_reference": "bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-license-32:9.11.4-26.P2.el7_9.10.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch" }, "product_reference": "bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-license-32:9.11.4-26.P2.el7_9.10.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch" }, "product_reference": "bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-license-32:9.11.4-26.P2.el7_9.10.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch" }, "product_reference": "bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64" }, "product_reference": "bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Maksym Odinintsev" ] } ], "cve": "CVE-2022-38177", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128601" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Bind package. By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: memory leak in ECDSA DNSSEC verification code", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects versions 9.8.4 -\u003e 9.16.32 of the Bind package, therefore Red Hat Enterprise Linux 6 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38177" }, { "category": "external", "summary": "RHBZ#2128601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38177", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38177" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-38177", "url": "https://kb.isc.org/docs/cve-2022-38177" } ], "release_date": "2022-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-03T15:35:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, the BIND daemon (named) will be restarted automatically.", "product_ids": [ "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6765" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: memory leak in ECDSA DNSSEC verification code" }, { "acknowledgments": [ { "names": [ "Maksym Odinintsev" ] } ], "cve": "CVE-2022-38178", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128602" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Bind package, where the DNSSEC verification code for the EdDSA algorithm leaks memory when there is a signature length mismatch. By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: memory leaks in EdDSA DNSSEC verification code", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects versions 9.9.12 -\u003e 9.16.32 of the Bind package, therefore Red Hat Enterprise Linux 6 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38178" }, { "category": "external", "summary": "RHBZ#2128602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38178", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38178" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38178", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38178" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-38178", "url": "https://kb.isc.org/docs/cve-2022-38178" } ], "release_date": "2022-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-03T15:35:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, the BIND daemon (named) will be restarted automatically.", "product_ids": [ "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6765" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Client-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Client-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Client-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7ComputeNode-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7ComputeNode-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Server-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Server-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Server-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Workstation-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.src", "7Workstation-optional-7.9.Z:bind-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-debuginfo-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-export-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-export-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-libs-lite-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-license-32:9.11.4-26.P2.el7_9.10.noarch", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-lite-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-devel-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.i686", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-libs-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-pkcs11-utils-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-sdb-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-sdb-chroot-32:9.11.4-26.P2.el7_9.10.x86_64", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.ppc64le", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.s390x", "7Workstation-optional-7.9.Z:bind-utils-32:9.11.4-26.P2.el7_9.10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: memory leaks in EdDSA DNSSEC verification code" } ] }
rhsa-2022_8598
Vulnerability from csaf_redhat
Published
2022-11-22 15:04
Modified
2024-11-22 20:21
Summary
Red Hat Security Advisory: Red Hat Virtualization Host security update [ovirt-4.5.3-1]
Notes
Topic
An update for redhat-release-virtualization-host, redhat-virtualization-host, and redhat-virtualization-host-productimg is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.
The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.
The following packages have been upgraded to a later upstream version: redhat-release-virtualization-host (4.5.2), redhat-virtualization-host (4.5.2), redhat-virtualization-host-productimg (4.5.2). (BZ#2070049, BZ#2093195)
Security Fix(es):
* libksba: integer overflow may lead to remote code execution (CVE-2022-3515)
* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)
* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)
* expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674)
* device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket (CVE-2022-41974)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for redhat-release-virtualization-host, redhat-virtualization-host, and redhat-virtualization-host-productimg is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks. \n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nThe following packages have been upgraded to a later upstream version: redhat-release-virtualization-host (4.5.2), redhat-virtualization-host (4.5.2), redhat-virtualization-host-productimg (4.5.2). (BZ#2070049, BZ#2093195)\n\nSecurity Fix(es):\n\n* libksba: integer overflow may lead to remote code execution (CVE-2022-3515)\n\n* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)\n\n* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)\n\n* expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674)\n\n* device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket (CVE-2022-41974)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:8598", "url": "https://access.redhat.com/errata/RHSA-2022:8598" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2127936", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127936" }, { "category": "external", "summary": "2128601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601" }, { "category": "external", "summary": "2128602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602" }, { "category": "external", "summary": "2128986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128986" }, { "category": "external", "summary": "2130769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130769" }, { "category": "external", "summary": "2133988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133988" }, { "category": "external", "summary": "2135610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135610" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8598.json" } ], "title": "Red Hat Security Advisory: Red Hat Virtualization Host security update [ovirt-4.5.3-1]", "tracking": { "current_release_date": "2024-11-22T20:21:48+00:00", "generator": { "date": "2024-11-22T20:21:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:8598", "initial_release_date": "2022-11-22T15:04:29+00:00", "revision_history": [ { "date": "2022-11-22T15:04:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-22T15:04:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T20:21:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product": { "name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.src", "product": { "name": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.src", "product_id": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.5.3-1.el8?arch=src" } } }, { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.src", "product": { "name": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.src", "product_id": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.5.3-1.el8ev?arch=src" } } }, { "category": "product_version", "name": "redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "product": { "name": "redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "product_id": "redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.5.3-202211170828_8.6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64", "product": { "name": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64", "product_id": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.5.3-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64", "product": { "name": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64", "product_id": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.5.3-1.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64", "product": { "name": "redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64", "product_id": "redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host-content@4.5.3-1.el8ev?arch=x86_64" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64", "product": { "name": "redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64", "product_id": "redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.5.3-202211170828_8.6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch", "product": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch", "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.5.3-1.el8ev?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:4.5.3-202211170828_8.6.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src" }, "product_reference": "redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8", "product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64" }, "product_reference": "redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64", "relates_to_product_reference": "8Base-RHV-Hypervisor-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src" }, "product_reference": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.src", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64" }, "product_reference": "redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64" }, "product_reference": "redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch" }, "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src" }, "product_reference": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.src", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)", "product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64" }, "product_reference": "redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64", "relates_to_product_reference": "8Base-RHV-HypervisorBuild-4" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Anonymous" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-3515", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-10-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135610" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.", "title": "Vulnerability description" }, { "category": "summary", "text": "libksba: integer overflow may lead to remote code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64" ], "known_not_affected": [ "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3515" }, { "category": "external", "summary": "RHBZ#2135610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135610" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3515", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3515" }, { "category": "external", "summary": "https://www.gnupg.org/blog/20221017-pepe-left-the-ksba.html", "url": "https://www.gnupg.org/blog/20221017-pepe-left-the-ksba.html" } ], "release_date": "2022-10-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-22T15:04:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8598" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "libksba: integer overflow may lead to remote code execution" }, { "acknowledgments": [ { "names": [ "Maksym Odinintsev" ] } ], "cve": "CVE-2022-38177", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2022-09-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128601" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Bind package. By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: memory leak in ECDSA DNSSEC verification code", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects versions 9.8.4 -\u003e 9.16.32 of the Bind package, therefore Red Hat Enterprise Linux 6 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64" ], "known_not_affected": [ "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38177" }, { "category": "external", "summary": "RHBZ#2128601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38177", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38177" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-38177", "url": "https://kb.isc.org/docs/cve-2022-38177" } ], "release_date": "2022-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-22T15:04:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8598" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: memory leak in ECDSA DNSSEC verification code" }, { "acknowledgments": [ { "names": [ "Maksym Odinintsev" ] } ], "cve": "CVE-2022-38178", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2022-09-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128602" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Bind package, where the DNSSEC verification code for the EdDSA algorithm leaks memory when there is a signature length mismatch. By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: memory leaks in EdDSA DNSSEC verification code", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects versions 9.9.12 -\u003e 9.16.32 of the Bind package, therefore Red Hat Enterprise Linux 6 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64" ], "known_not_affected": [ "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38178" }, { "category": "external", "summary": "RHBZ#2128602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38178", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38178" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38178", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38178" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-38178", "url": "https://kb.isc.org/docs/cve-2022-38178" } ], "release_date": "2022-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-22T15:04:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8598" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: memory leaks in EdDSA DNSSEC verification code" }, { "cve": "CVE-2022-40674", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-09-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2130769" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in expat. With this flaw, it is possible to create a situation in which parsing is suspended while substituting in an internal entity so that XML_ResumeParser directly uses the internalEntityProcessor as its processor. If the subsequent parse includes some unclosed tags, this will return without calling storeRawNames to ensure that the raw versions of the tag names are stored in memory other than the parse buffer itself. Issues occur if the parse buffer is changed or reallocated (for example, if processing a file line by line), problems occur. Using this vulnerability in the doContent function allows an attacker to triage a denial of service or potentially arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: a use-after-free in the doContent function in xmlparse.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as important because this flaw can easily compromise the confidentiality, integrity, or availability of resources but a successful attack can not execute arbitrary code, or allow remote users to cause a denial of service because attack complexity is high and depends on conditions beyond the attacker\u0027s control.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64" ], "known_not_affected": [ "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-40674" }, { "category": "external", "summary": "RHBZ#2130769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130769" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-40674", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40674" }, { "category": "external", "summary": "https://blog.hartwork.org/posts/expat-2-4-9-released/", "url": "https://blog.hartwork.org/posts/expat-2-4-9-released/" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-2vq2-xc55-3j5m", "url": "https://github.com/advisories/GHSA-2vq2-xc55-3j5m" } ], "release_date": "2022-09-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-22T15:04:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8598" }, { "category": "workaround", "details": "There is no known mitigation other than restricting applications using the expat library from processing XML content. Please update the affected packages as soon as possible.", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "expat: a use-after-free in the doContent function in xmlparse.c" }, { "cve": "CVE-2022-41974", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2022-10-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2133988" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the device-mapper-multipath. The device-mapper-multipath allows local users to obtain root access, exploited alone or in conjunction with CVE-2022-41973. Local users that are able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This issue occurs because an attacker can repeat a keyword, which is mishandled when arithmetic ADD is used instead of bitwise OR. This could lead to local privilege escalation to root.", "title": "Vulnerability description" }, { "category": "summary", "text": "device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64" ], "known_not_affected": [ "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.src", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.3-1.el8ev.x86_64", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.3-1.el8ev.noarch", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.src", "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.3-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41974" }, { "category": "external", "summary": "RHBZ#2133988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133988" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41974", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41974" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41974", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41974" }, { "category": "external", "summary": "https://www.qualys.com/2022/10/24/leeloo-multipath/leeloo-multipath.txt", "url": "https://www.qualys.com/2022/10/24/leeloo-multipath/leeloo-multipath.txt" } ], "release_date": "2022-10-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-22T15:04:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8598" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.3-202211170828_8.6.src", "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.3-202211170828_8.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket" } ] }
rhsa-2022_6781
Vulnerability from csaf_redhat
Published
2022-10-04 15:40
Modified
2024-11-22 20:23
Summary
Red Hat Security Advisory: bind9.16 security update
Notes
Topic
An update for bind9.16 is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly (CVE-2022-3080)
* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)
* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for bind9.16 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.\n\nSecurity Fix(es):\n\n* bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly (CVE-2022-3080)\n\n* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)\n\n* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6781", "url": "https://access.redhat.com/errata/RHSA-2022:6781" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2128600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128600" }, { "category": "external", "summary": "2128601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601" }, { "category": "external", "summary": "2128602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6781.json" } ], "title": "Red Hat Security Advisory: bind9.16 security update", "tracking": { "current_release_date": "2024-11-22T20:23:44+00:00", "generator": { "date": "2024-11-22T20:23:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:6781", "initial_release_date": "2022-10-04T15:40:29+00:00", "revision_history": [ { "date": "2022-10-04T15:40:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-10-04T15:40:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T20:23:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CRB (v. 8)", "product": { "name": "Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bind9.16-32:9.16.23-0.7.el8_6.1.src", "product": { "name": "bind9.16-32:9.16.23-0.7.el8_6.1.src", "product_id": "bind9.16-32:9.16.23-0.7.el8_6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16@9.16.23-0.7.el8_6.1?arch=src\u0026epoch=32" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "product": { "name": "bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "product_id": "bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16@9.16.23-0.7.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "product": { "name": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "product_id": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-chroot@9.16.23-0.7.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "product": { "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "product_id": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-libs@9.16.23-0.7.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "product": { "name": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "product_id": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-utils@9.16.23-0.7.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "product": { "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "product_id": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-debugsource@9.16.23-0.7.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "product": { "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "product_id": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-debuginfo@9.16.23-0.7.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "product": { "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "product_id": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-dnssec-utils-debuginfo@9.16.23-0.7.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "product": { "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "product_id": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-libs-debuginfo@9.16.23-0.7.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "product": { "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "product_id": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-utils-debuginfo@9.16.23-0.7.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "product": { "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "product_id": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-devel@9.16.23-0.7.el8_6.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "product": { "name": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "product_id": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-dnssec-utils@9.16.23-0.7.el8_6.1?arch=aarch64\u0026epoch=32" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "product": { "name": "bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "product_id": "bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16@9.16.23-0.7.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "product": { "name": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "product_id": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-chroot@9.16.23-0.7.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "product": { "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "product_id": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-libs@9.16.23-0.7.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "product": { "name": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "product_id": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-utils@9.16.23-0.7.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "product": { "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "product_id": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-debugsource@9.16.23-0.7.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "product": { "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "product_id": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-debuginfo@9.16.23-0.7.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "product": { "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "product_id": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-dnssec-utils-debuginfo@9.16.23-0.7.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "product": { "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "product_id": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-libs-debuginfo@9.16.23-0.7.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "product": { "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "product_id": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-utils-debuginfo@9.16.23-0.7.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "product": { "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "product_id": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-devel@9.16.23-0.7.el8_6.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "product": { "name": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "product_id": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-dnssec-utils@9.16.23-0.7.el8_6.1?arch=ppc64le\u0026epoch=32" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "product": { "name": "bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "product_id": "bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16@9.16.23-0.7.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "product": { "name": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "product_id": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-chroot@9.16.23-0.7.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "product": { "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "product_id": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-libs@9.16.23-0.7.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "product": { "name": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "product_id": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-utils@9.16.23-0.7.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "product": { "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "product_id": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-debugsource@9.16.23-0.7.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "product": { "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "product_id": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-debuginfo@9.16.23-0.7.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "product": { "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "product_id": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-dnssec-utils-debuginfo@9.16.23-0.7.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "product": { "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "product_id": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-libs-debuginfo@9.16.23-0.7.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "product": { "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "product_id": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-utils-debuginfo@9.16.23-0.7.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "product": { "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "product_id": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-devel@9.16.23-0.7.el8_6.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "product": { "name": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "product_id": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-dnssec-utils@9.16.23-0.7.el8_6.1?arch=x86_64\u0026epoch=32" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "product": { "name": "bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "product_id": "bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16@9.16.23-0.7.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "product": { "name": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "product_id": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-chroot@9.16.23-0.7.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "product": { "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "product_id": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-libs@9.16.23-0.7.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "product": { "name": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "product_id": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-utils@9.16.23-0.7.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "product": { "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "product_id": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-debugsource@9.16.23-0.7.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "product": { "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "product_id": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-debuginfo@9.16.23-0.7.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "product": { "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "product_id": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-dnssec-utils-debuginfo@9.16.23-0.7.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "product": { "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "product_id": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-libs-debuginfo@9.16.23-0.7.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "product": { "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "product_id": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-utils-debuginfo@9.16.23-0.7.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "product": { "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "product_id": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-devel@9.16.23-0.7.el8_6.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "product": { "name": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "product_id": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-dnssec-utils@9.16.23-0.7.el8_6.1?arch=s390x\u0026epoch=32" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "product": { "name": "bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "product_id": "bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-license@9.16.23-0.7.el8_6.1?arch=noarch\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "product": { "name": "bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "product_id": "bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-doc@9.16.23-0.7.el8_6.1?arch=noarch\u0026epoch=32" } } }, { "category": "product_version", "name": "python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch", "product": { "name": "python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch", "product_id": "python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-bind9.16@9.16.23-0.7.el8_6.1?arch=noarch\u0026epoch=32" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "product": { "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "product_id": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-devel@9.16.23-0.7.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "product": { "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "product_id": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-libs@9.16.23-0.7.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "product": { "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "product_id": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-debugsource@9.16.23-0.7.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "product": { "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "product_id": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-debuginfo@9.16.23-0.7.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "product": { "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "product_id": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-dnssec-utils-debuginfo@9.16.23-0.7.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "product": { "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "product_id": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-libs-debuginfo@9.16.23-0.7.el8_6.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "product": { "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "product_id": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind9.16-utils-debuginfo@9.16.23-0.7.el8_6.1?arch=i686\u0026epoch=32" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bind9.16-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-32:9.16.23-0.7.el8_6.1.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src" }, "product_reference": "bind9.16-32:9.16.23-0.7.el8_6.1.src", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686" }, "product_reference": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686" }, "product_reference": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686" }, "product_reference": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686" }, "product_reference": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch" }, "product_reference": "bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686" }, "product_reference": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686" }, "product_reference": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch" }, "product_reference": "bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686" }, "product_reference": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch" }, "product_reference": "python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-32:9.16.23-0.7.el8_6.1.src as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src" }, "product_reference": "bind9.16-32:9.16.23-0.7.el8_6.1.src", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686" }, "product_reference": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686" }, "product_reference": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686" }, "product_reference": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686" }, "product_reference": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch" }, "product_reference": "bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686" }, "product_reference": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686" }, "product_reference": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch" }, "product_reference": "bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64" }, "product_reference": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686" }, "product_reference": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le" }, "product_reference": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x" }, "product_reference": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64" }, "product_reference": "bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch" }, "product_reference": "python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Maksym Odinintsev" ] } ], "cve": "CVE-2022-3080", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128600" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Bind package, where the resolver can crash when stale cache and stale answers are enabled, option stale-answer-client-timeout is set to 0 and there is a stale CNAME in the cache for an incoming query. By sending specific queries to the resolver, an attacker can cause named to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects versions 9.16.14 and higher of the Bind package. Therefore Red Hat Enterprise Linux 6 and 7 are not impacted.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3080" }, { "category": "external", "summary": "RHBZ#2128600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3080", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3080" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-3080", "url": "https://kb.isc.org/docs/cve-2022-3080" } ], "release_date": "2022-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-04T15:40:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6781" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly" }, { "acknowledgments": [ { "names": [ "Maksym Odinintsev" ] } ], "cve": "CVE-2022-38177", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128601" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Bind package. By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: memory leak in ECDSA DNSSEC verification code", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects versions 9.8.4 -\u003e 9.16.32 of the Bind package, therefore Red Hat Enterprise Linux 6 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38177" }, { "category": "external", "summary": "RHBZ#2128601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38177", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38177" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-38177", "url": "https://kb.isc.org/docs/cve-2022-38177" } ], "release_date": "2022-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-04T15:40:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6781" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: memory leak in ECDSA DNSSEC verification code" }, { "acknowledgments": [ { "names": [ "Maksym Odinintsev" ] } ], "cve": "CVE-2022-38178", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128602" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Bind package, where the DNSSEC verification code for the EdDSA algorithm leaks memory when there is a signature length mismatch. By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: memory leaks in EdDSA DNSSEC verification code", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects versions 9.9.12 -\u003e 9.16.32 of the Bind package, therefore Red Hat Enterprise Linux 6 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38178" }, { "category": "external", "summary": "RHBZ#2128602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38178", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38178" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38178", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38178" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-38178", "url": "https://kb.isc.org/docs/cve-2022-38178" } ], "release_date": "2022-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-04T15:40:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6781" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "AppStream-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.src", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-chroot-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-debugsource-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-devel-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-dnssec-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-doc-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-libs-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-license-32:9.16.23-0.7.el8_6.1.noarch", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.aarch64", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.i686", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.s390x", "CRB-8.6.0.Z.MAIN.EUS:bind9.16-utils-debuginfo-32:9.16.23-0.7.el8_6.1.x86_64", "CRB-8.6.0.Z.MAIN.EUS:python3-bind9.16-32:9.16.23-0.7.el8_6.1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: memory leaks in EdDSA DNSSEC verification code" } ] }
rhsa-2022_6779
Vulnerability from csaf_redhat
Published
2022-10-04 15:38
Modified
2024-11-22 20:21
Summary
Red Hat Security Advisory: bind security update
Notes
Topic
An update for bind is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)
* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for bind is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.\n\nSecurity Fix(es):\n\n* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)\n\n* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6779", "url": "https://access.redhat.com/errata/RHSA-2022:6779" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2128601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601" }, { "category": "external", "summary": "2128602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6779.json" } ], "title": "Red Hat Security Advisory: bind security update", "tracking": { "current_release_date": "2024-11-22T20:21:11+00:00", "generator": { "date": "2024-11-22T20:21:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:6779", "initial_release_date": "2022-10-04T15:38:19+00:00", "revision_history": [ { "date": "2022-10-04T15:38:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-10-04T15:38:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T20:21:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.4::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-chroot-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-chroot-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-devel-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-devel-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-libs-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-libs-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-sdb-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-sdb-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-utils-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-utils-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-debugsource-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-debugsource-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-export-devel-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-export-devel-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.26-4.el8_4.1.aarch64", "product": { "name": "bind-export-libs-32:9.11.26-4.el8_4.1.aarch64", "product_id": "bind-export-libs-32:9.11.26-4.el8_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.26-4.el8_4.1?arch=aarch64\u0026epoch=32" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-chroot-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-chroot-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-devel-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-devel-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-libs-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-libs-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-sdb-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-sdb-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-utils-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-utils-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le", "product": { "name": "bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le", "product_id": "bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.26-4.el8_4.1?arch=ppc64le\u0026epoch=32" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-chroot-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-chroot-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-devel-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-devel-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-libs-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-libs-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-sdb-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-sdb-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-utils-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-utils-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-debugsource-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-debugsource-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-export-devel-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-export-devel-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.26-4.el8_4.1.x86_64", "product": { "name": "bind-export-libs-32:9.11.26-4.el8_4.1.x86_64", "product_id": "bind-export-libs-32:9.11.26-4.el8_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.26-4.el8_4.1?arch=x86_64\u0026epoch=32" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bind-devel-32:9.11.26-4.el8_4.1.i686", "product": { "name": "bind-devel-32:9.11.26-4.el8_4.1.i686", "product_id": "bind-devel-32:9.11.26-4.el8_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.26-4.el8_4.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.26-4.el8_4.1.i686", "product": { "name": "bind-libs-32:9.11.26-4.el8_4.1.i686", "product_id": "bind-libs-32:9.11.26-4.el8_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.26-4.el8_4.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.i686", "product": { "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.i686", "product_id": "bind-libs-lite-32:9.11.26-4.el8_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.26-4.el8_4.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.i686", "product": { "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.i686", "product_id": "bind-lite-devel-32:9.11.26-4.el8_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.26-4.el8_4.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686", "product": { "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686", "product_id": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.26-4.el8_4.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686", "product": { "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686", "product_id": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.26-4.el8_4.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.26-4.el8_4.1.i686", "product": { "name": "bind-debugsource-32:9.11.26-4.el8_4.1.i686", "product_id": "bind-debugsource-32:9.11.26-4.el8_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.26-4.el8_4.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.i686", "product": { "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.i686", "product_id": "bind-debuginfo-32:9.11.26-4.el8_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.26-4.el8_4.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "product": { "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "product_id": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.26-4.el8_4.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "product": { "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "product_id": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.26-4.el8_4.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686", "product_id": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.26-4.el8_4.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686", "product_id": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.26-4.el8_4.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.26-4.el8_4.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.26-4.el8_4.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686", "product": { "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686", "product_id": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.26-4.el8_4.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "product": { "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "product_id": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.26-4.el8_4.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.26-4.el8_4.1.i686", "product": { "name": "bind-export-devel-32:9.11.26-4.el8_4.1.i686", "product_id": "bind-export-devel-32:9.11.26-4.el8_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.26-4.el8_4.1?arch=i686\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.26-4.el8_4.1.i686", "product": { "name": "bind-export-libs-32:9.11.26-4.el8_4.1.i686", "product_id": "bind-export-libs-32:9.11.26-4.el8_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.26-4.el8_4.1?arch=i686\u0026epoch=32" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-chroot-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-chroot-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-chroot-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-devel-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-devel-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-devel-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-libs-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-libs-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-libs-lite-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-lite-devel-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-lite-devel@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-pkcs11-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-pkcs11-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-devel@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-sdb-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-sdb-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-chroot@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-utils-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-utils-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debugsource-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-debugsource-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-debugsource-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debugsource@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs-debuginfo@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-debuginfo@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs-lite-debuginfo@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-debuginfo@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-libs-debuginfo@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-pkcs11-utils-debuginfo@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb-debuginfo@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils-debuginfo@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-devel-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-export-devel-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-export-devel-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-devel@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } }, { "category": "product_version", "name": "bind-export-libs-32:9.11.26-4.el8_4.1.s390x", "product": { "name": "bind-export-libs-32:9.11.26-4.el8_4.1.s390x", "product_id": "bind-export-libs-32:9.11.26-4.el8_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-export-libs@9.11.26-4.el8_4.1?arch=s390x\u0026epoch=32" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "bind-license-32:9.11.26-4.el8_4.1.noarch", "product": { "name": "bind-license-32:9.11.26-4.el8_4.1.noarch", "product_id": "bind-license-32:9.11.26-4.el8_4.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-license@9.11.26-4.el8_4.1?arch=noarch\u0026epoch=32" } } }, { "category": "product_version", "name": "python3-bind-32:9.11.26-4.el8_4.1.noarch", "product": { "name": "python3-bind-32:9.11.26-4.el8_4.1.noarch", "product_id": "python3-bind-32:9.11.26-4.el8_4.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-bind@9.11.26-4.el8_4.1?arch=noarch\u0026epoch=32" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "bind-32:9.11.26-4.el8_4.1.src", "product": { "name": "bind-32:9.11.26-4.el8_4.1.src", "product_id": "bind-32:9.11.26-4.el8_4.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.11.26-4.el8_4.1?arch=src\u0026epoch=32" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.26-4.el8_4.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.src" }, "product_reference": "bind-32:9.11.26-4.el8_4.1.src", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-chroot-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-chroot-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-chroot-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-chroot-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-debuginfo-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-debuginfo-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-debugsource-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-debugsource-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-debugsource-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-debugsource-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-devel-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-devel-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-devel-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-devel-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-devel-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-export-devel-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-export-devel-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-export-devel-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-export-devel-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-export-libs-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-export-libs-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-export-libs-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-export-libs-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-libs-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-libs-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-libs-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-libs-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-libs-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-libs-lite-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-libs-lite-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-license-32:9.11.26-4.el8_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-license-32:9.11.26-4.el8_4.1.noarch" }, "product_reference": "bind-license-32:9.11.26-4.el8_4.1.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-lite-devel-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-lite-devel-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-pkcs11-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-sdb-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-sdb-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-sdb-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-sdb-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-utils-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-utils-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-utils-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-utils-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-bind-32:9.11.26-4.el8_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:python3-bind-32:9.11.26-4.el8_4.1.noarch" }, "product_reference": "python3-bind-32:9.11.26-4.el8_4.1.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.26-4.el8_4.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.src" }, "product_reference": "bind-32:9.11.26-4.el8_4.1.src", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-chroot-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-chroot-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-chroot-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-chroot-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-debuginfo-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-debuginfo-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-debugsource-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-debugsource-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-debugsource-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debugsource-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-debugsource-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-devel-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-devel-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-devel-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-devel-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-devel-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-export-devel-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-export-devel-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-export-devel-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-devel-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-export-devel-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-export-libs-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-export-libs-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-export-libs-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-export-libs-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-libs-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-libs-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-libs-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-libs-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-libs-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-libs-lite-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-libs-lite-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-license-32:9.11.26-4.el8_4.1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-license-32:9.11.26-4.el8_4.1.noarch" }, "product_reference": "bind-license-32:9.11.26-4.el8_4.1.noarch", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-lite-devel-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-lite-devel-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-pkcs11-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-sdb-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-sdb-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-sdb-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-sdb-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-utils-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-utils-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-utils-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-utils-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64" }, "product_reference": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686" }, "product_reference": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le" }, "product_reference": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x" }, "product_reference": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64" }, "product_reference": "bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-bind-32:9.11.26-4.el8_4.1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)", "product_id": "BaseOS-8.4.0.Z.EUS:python3-bind-32:9.11.26-4.el8_4.1.noarch" }, "product_reference": "python3-bind-32:9.11.26-4.el8_4.1.noarch", "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Maksym Odinintsev" ] } ], "cve": "CVE-2022-38177", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128601" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Bind package. By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: memory leak in ECDSA DNSSEC verification code", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects versions 9.8.4 -\u003e 9.16.32 of the Bind package, therefore Red Hat Enterprise Linux 6 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.src", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-license-32:9.11.26-4.el8_4.1.noarch", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:python3-bind-32:9.11.26-4.el8_4.1.noarch", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.src", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-license-32:9.11.26-4.el8_4.1.noarch", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:python3-bind-32:9.11.26-4.el8_4.1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38177" }, { "category": "external", "summary": "RHBZ#2128601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38177", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38177" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-38177", "url": "https://kb.isc.org/docs/cve-2022-38177" } ], "release_date": "2022-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-04T15:38:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, the BIND daemon (named) will be restarted automatically.", "product_ids": [ "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.src", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-license-32:9.11.26-4.el8_4.1.noarch", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:python3-bind-32:9.11.26-4.el8_4.1.noarch", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.src", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-license-32:9.11.26-4.el8_4.1.noarch", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:python3-bind-32:9.11.26-4.el8_4.1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6779" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.src", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-license-32:9.11.26-4.el8_4.1.noarch", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:python3-bind-32:9.11.26-4.el8_4.1.noarch", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.src", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-license-32:9.11.26-4.el8_4.1.noarch", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:python3-bind-32:9.11.26-4.el8_4.1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: memory leak in ECDSA DNSSEC verification code" }, { "acknowledgments": [ { "names": [ "Maksym Odinintsev" ] } ], "cve": "CVE-2022-38178", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128602" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Bind package, where the DNSSEC verification code for the EdDSA algorithm leaks memory when there is a signature length mismatch. By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: memory leaks in EdDSA DNSSEC verification code", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects versions 9.9.12 -\u003e 9.16.32 of the Bind package, therefore Red Hat Enterprise Linux 6 is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.src", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-license-32:9.11.26-4.el8_4.1.noarch", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:python3-bind-32:9.11.26-4.el8_4.1.noarch", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.src", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-license-32:9.11.26-4.el8_4.1.noarch", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:python3-bind-32:9.11.26-4.el8_4.1.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-38178" }, { "category": "external", "summary": "RHBZ#2128602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-38178", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38178" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38178", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38178" }, { "category": "external", "summary": "https://kb.isc.org/docs/cve-2022-38178", "url": "https://kb.isc.org/docs/cve-2022-38178" } ], "release_date": "2022-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-10-04T15:38:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, the BIND daemon (named) will be restarted automatically.", "product_ids": [ "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.src", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-license-32:9.11.26-4.el8_4.1.noarch", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:python3-bind-32:9.11.26-4.el8_4.1.noarch", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.src", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-license-32:9.11.26-4.el8_4.1.noarch", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:python3-bind-32:9.11.26-4.el8_4.1.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6779" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.src", "AppStream-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-license-32:9.11.26-4.el8_4.1.noarch", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "AppStream-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "AppStream-8.4.0.Z.EUS:python3-bind-32:9.11.26-4.el8_4.1.noarch", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.src", "BaseOS-8.4.0.Z.EUS:bind-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-chroot-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-debugsource-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-export-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-export-libs-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-export-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-libs-lite-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-license-32:9.11.26-4.el8_4.1.noarch", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-lite-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-devel-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-libs-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-pkcs11-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-sdb-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-sdb-chroot-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-sdb-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-utils-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.aarch64", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.i686", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.ppc64le", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.s390x", "BaseOS-8.4.0.Z.EUS:bind-utils-debuginfo-32:9.11.26-4.el8_4.1.x86_64", "BaseOS-8.4.0.Z.EUS:python3-bind-32:9.11.26-4.el8_4.1.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bind: memory leaks in EdDSA DNSSEC verification code" } ] }
ghsa-349w-cgp3-287r
Vulnerability from github
Published
2022-09-22 00:00
Modified
2022-09-25 00:00
Severity ?
Details
By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
{ "affected": [], "aliases": [ "CVE-2022-38178" ], "database_specific": { "cwe_ids": [ "CWE-347" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-09-21T11:15:00Z", "severity": "HIGH" }, "details": "By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.", "id": "GHSA-349w-cgp3-287r", "modified": "2022-09-25T00:00:20Z", "published": "2022-09-22T00:00:32Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38178" }, { "type": "WEB", "url": "https://kb.isc.org/docs/cve-2022-38178" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202210-25" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20221228-0009" }, { "type": "WEB", "url": "https://www.debian.org/security/2022/dsa-5235" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/09/21/3" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
WID-SEC-W-2024-0794
Vulnerability from csaf_certbund
Published
2024-04-04 22:00
Modified
2024-04-04 22:00
Summary
Dell ECS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell ECS ist ein Objektspeichersystem.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
WID-SEC-W-2022-1492
Vulnerability from csaf_certbund
Published
2022-09-20 22:00
Modified
2024-05-06 22:00
Summary
Internet Systems Consortium BIND: Mehrere Schwachstellen ermöglichen Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
BIND (Berkeley Internet Name Domain) ist ein Open-Source-Softwarepaket, das einen Domain-Name-System-Server implementiert.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Internet Systems Consortium BIND ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- Sonstiges
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "BIND (Berkeley Internet Name Domain) ist ein Open-Source-Softwarepaket, das einen Domain-Name-System-Server implementiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Internet Systems Consortium BIND ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1492 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1492.json" }, { "category": "self", "summary": "WID-SEC-2022-1492 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1492" }, { "category": "external", "summary": "BIND Release Notes vom 2022-09-20", "url": "https://downloads.isc.org/isc/bind9/9.16.33/doc/arm/html/notes.html" }, { "category": "external", "summary": "BIND Release Notes vom 2022-09-20", "url": "https://downloads.isc.org/isc/bind9/9.18.7/doc/arm/html/notes.html" }, { "category": "external", "summary": "BIND Release Notes vom 2022-09-20", "url": "https://downloads.isc.org/isc/bind9/9.19.1/doc/arm/html/notes.html" }, { "category": "external", "summary": "BIND Vulnerability Note vom 2022-09-20", "url": "https://kb.isc.org/docs/cve-2022-2795" }, { "category": "external", "summary": "BIND Vulnerability Note vom 2022-09-20", "url": "https://kb.isc.org/docs/cve-2022-2881" }, { "category": "external", "summary": "BIND Vulnerability Note vom 2022-09-20", "url": "https://kb.isc.org/docs/cve-2022-2906" }, { "category": "external", "summary": "BIND Vulnerability Note vom 2022-09-20", "url": "https://kb.isc.org/docs/cve-2022-3080" }, { "category": "external", "summary": "BIND Vulnerability Note vom 2022-09-20", "url": "https://kb.isc.org/docs/cve-2022-38177" }, { "category": "external", "summary": "BIND Vulnerability Note vom 2022-09-20", "url": "https://kb.isc.org/docs/cve-2022-38178" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5626-2 vom 2022-09-21", "url": "https://ubuntu.com/security/notices/USN-5626-2" }, { "category": "external", "summary": "Infoblox Advisory CVE-2022-38177 and CVE-2022-38178 vom 2022-09-21", "url": "https://support.infoblox.com/s/article/CVE-2022-38177-and-CVE-2022-38178" }, { "category": "external", "summary": "Infoblox Advisory CVE-2022-2795 vom 2022-09-21", "url": "https://support.infoblox.com/s/article/CVE-2022-2795" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5626-1 vom 2022-09-21", "url": "https://ubuntu.com/security/notices/USN-5626-1" }, { "category": "external", "summary": "Debian Security Advisory DSA-5235 vom 2022-09-22", "url": "https://lists.debian.org/debian-security-announce/2022/msg00204.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5235 vom 2022-09-23", "url": "https://www.debian.org/security/2022/dsa-5235" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-6765 vom 2022-10-04", "url": "http://linux.oracle.com/errata/ELSA-2022-6765.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6763 vom 2022-10-03", "url": "https://access.redhat.com/errata/RHSA-2022:6763" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6764 vom 2022-10-03", "url": "https://access.redhat.com/errata/RHSA-2022:6764" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6765 vom 2022-10-03", "url": "https://access.redhat.com/errata/RHSA-2022:6765" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-6763 vom 2022-10-04", "url": "http://linux.oracle.com/errata/ELSA-2022-6763.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-6778 vom 2022-10-05", "url": "https://linux.oracle.com/errata/ELSA-2022-6778.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6778 vom 2022-10-04", "url": "https://access.redhat.com/errata/RHSA-2022:6778" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6779 vom 2022-10-04", "url": "https://access.redhat.com/errata/RHSA-2022:6779" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6780 vom 2022-10-04", "url": "https://access.redhat.com/errata/RHSA-2022:6780" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6781 vom 2022-10-04", "url": "https://access.redhat.com/errata/RHSA-2022:6781" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3499-1 vom 2022-10-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012492.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3500-1 vom 2022-10-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012484.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-6781 vom 2022-10-05", "url": "https://linux.oracle.com/errata/ELSA-2022-6781.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3138 vom 2022-10-05", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html" }, { "category": "external", "summary": "Oracle Solaris Third Party Bulletin-October 2022 vom 2022-10-18", "url": "https://www.oracle.com/security-alerts/bulletinoct2022.html" }, { "category": "external", "summary": "Oracle Linux Bulletin-October 2022 vom 2022-10-18", "url": "https://www.oracle.com/security-alerts/linuxbulletinoct2022.html" }, { "category": "external", "summary": "F5 Security Advisory K27155546 vom 2022-10-19", "url": "https://support.f5.com/csp/article/K27155546" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6905 vom 2022-10-19", "url": "https://access.redhat.com/errata/RHSA-2022:6905" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3682-1 vom 2022-10-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012598.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3729-1 vom 2022-10-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012671.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3767-1 vom 2022-10-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012698.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2022:6765 vom 2022-10-26", "url": "https://lists.centos.org/pipermail/centos-announce/2022-October/073648.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202210-25 vom 2022-10-31", "url": "https://security.gentoo.org/glsa/202210-25" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7643 vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7643" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8598 vom 2022-11-22", "url": "https://access.redhat.com/errata/RHSA-2022:8598" }, { "category": "external", "summary": "F5 Security Advisory K11742512 vom 2022-11-28", "url": "https://support.f5.com/csp/article/K11742512" }, { "category": "external", "summary": "IBM Security Bulletin 6851445 vom 2022-12-22", "url": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20221228-0009 vom 2022-12-28", "url": "https://security.netapp.com/advisory/ntap-20221228-0009/" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20221228-0010 vom 2022-12-28", "url": "https://security.netapp.com/advisory/ntap-20221228-0010/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-0402 vom 2023-01-24", "url": "http://linux.oracle.com/errata/ELSA-2023-0402.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0402 vom 2023-01-24", "url": "https://access.redhat.com/errata/RHSA-2023:0402" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-0402 vom 2023-01-24", "url": "https://linux.oracle.com/errata/ELSA-2023-0402.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2023:0402 vom 2023-01-30", "url": "https://lists.centos.org/pipermail/centos-announce/2023-January/086358.html" }, { "category": "external", "summary": "IBM Security Bulletin 6955057 vom 2023-02-13", "url": "https://www.ibm.com/support/pages/node/6955057" }, { "category": "external", "summary": "IBM Security Bulletin 7094965 vom 2023-12-11", "url": "https://www.ibm.com/support/pages/node/7094965" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-2001 vom 2023-03-22", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2001.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:2261 vom 2023-05-09", "url": "https://access.redhat.com/errata/RHSA-2023:2261" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3002 vom 2023-05-16", "url": "https://access.redhat.com/errata/RHSA-2023:3002" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:2792 vom 2023-05-16", "url": "https://access.redhat.com/errata/RHSA-2023:2792" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-2792 vom 2023-05-24", "url": "https://linux.oracle.com/errata/ELSA-2023-2792.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-3002 vom 2023-05-24", "url": "https://linux.oracle.com/errata/ELSA-2023-3002.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3609 vom 2023-06-15", "url": "https://access.redhat.com/errata/RHSA-2023:3609" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2720 vom 2024-05-07", "url": "https://access.redhat.com/errata/RHSA-2024:2720" } ], "source_lang": "en-US", "title": "Internet Systems Consortium BIND: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2024-05-06T22:00:00.000+00:00", "generator": { "date": "2024-05-07T11:33:18.031+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1492", "initial_release_date": "2022-09-20T22:00:00.000+00:00", "revision_history": [ { "date": "2022-09-20T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-09-21T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-09-22T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-10-03T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2022-10-04T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Oracle Linux, Red Hat und SUSE aufgenommen" }, { "date": "2022-10-05T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-10-18T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates aufgenommen" }, { "date": "2022-10-19T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von F5 und Red Hat aufgenommen" }, { "date": "2022-10-23T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-10-25T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-10-26T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE und CentOS aufgenommen" }, { "date": "2022-10-30T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2022-11-08T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-22T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-28T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2022-12-22T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von IBM und IBM-APAR aufgenommen" }, { "date": "2022-12-28T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2023-01-24T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2023-01-30T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2023-02-13T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-03-21T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-05-09T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-05-16T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-05-23T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-06-14T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-12-11T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-05-06T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "27" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7.1", "product": { "name": "IBM AIX 7.1", "product_id": "153340", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:7.1" } } }, { "category": "product_version", "name": "7.2", "product": { "name": "IBM AIX 7.2", "product_id": "434967", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:7.2" } } }, { "category": "product_version", "name": "7.3", "product": { "name": "IBM AIX 7.3", "product_id": "T021486", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:7.3" } } } ], "category": "product_name", "name": "AIX" }, { "branches": [ { "category": "product_version", "name": "v10", "product": { "name": "IBM Power Hardware Management Console v10", "product_id": "T023373", "product_identification_helper": { "cpe": "cpe:/a:ibm:hardware_management_console:v10" } } } ], "category": "product_name", "name": "Power Hardware Management Console" }, { "branches": [ { "category": "product_version", "name": "7.5", "product": { "name": "IBM QRadar SIEM 7.5", "product_id": "T022954", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5" } } }, { "category": "product_version", "name": "7.4", "product": { "name": "IBM QRadar SIEM 7.4", "product_id": "T024775", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.4" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version", "name": "3.1", "product": { "name": "IBM VIOS 3.1", "product_id": "1039165", "product_identification_helper": { "cpe": "cpe:/a:ibm:vios:3.1" } } } ], "category": "product_name", "name": "VIOS" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Infoblox NIOS", "product": { "name": "Infoblox NIOS", "product_id": "T014068", "product_identification_helper": { "cpe": "cpe:/o:infoblox:nios:-" } } } ], "category": "vendor", "name": "Infoblox" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 9.16.33", "product": { "name": "Internet Systems Consortium BIND \u003c 9.16.33", "product_id": "T024677", "product_identification_helper": { "cpe": "cpe:/a:isc:bind:9.16.33" } } }, { "category": "product_version_range", "name": "\u003c 9.18.7", "product": { "name": "Internet Systems Consortium BIND \u003c 9.18.7", "product_id": "T024678", "product_identification_helper": { "cpe": "cpe:/a:isc:bind:9.18.7" } } }, { "category": "product_version_range", "name": "\u003c 9.19.1", "product": { "name": "Internet Systems Consortium BIND \u003c 9.19.1", "product_id": "T024679", "product_identification_helper": { "cpe": "cpe:/a:isc:bind:9.19.1" } } } ], "category": "product_name", "name": "BIND" } ], "category": "vendor", "name": "Internet Systems Consortium" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "for VMware vSphere", "product": { "name": "NetApp ActiveIQ Unified Manager for VMware vSphere", "product_id": "T025152", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere" } } } ], "category": "product_name", "name": "ActiveIQ Unified Manager" } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } }, { "category": "product_name", "name": "Oracle Solaris", "product": { "name": "Oracle Solaris", "product_id": "T002965", "product_identification_helper": { "cpe": "cpe:/a:oracle:solaris:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift", "product": { "name": "Red Hat OpenShift", "product_id": "T008027", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:-" } } }, { "category": "product_version", "name": "Data Foundation 4", "product": { "name": "Red Hat OpenShift Data Foundation 4", "product_id": "T028133", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:data_foundation_4" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Die Fehler sind auf mehrere Speicherlecks, einen Puffer\u00fcberlauf, eine unzureichende Leistung und eine unzureichende Terminierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "153340", "T028133", "T025152", "T008027", "67646", "434967", "1039165", "T002965", "T012167", "T004914", "T014068", "T022954", "2951", "T002207", "T000126", "T001663", "398363", "T024775", "1727", "T021486", "T023373" ] }, "release_date": "2022-09-20T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-2881", "notes": [ { "category": "description", "text": "In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Die Fehler sind auf mehrere Speicherlecks, einen Puffer\u00fcberlauf, eine unzureichende Leistung und eine unzureichende Terminierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "153340", "T028133", "T025152", "T008027", "67646", "434967", "1039165", "T002965", "T012167", "T004914", "T014068", "T022954", "2951", "T002207", "T000126", "T001663", "398363", "T024775", "1727", "T021486", "T023373" ] }, "release_date": "2022-09-20T22:00:00Z", "title": "CVE-2022-2881" }, { "cve": "CVE-2022-2906", "notes": [ { "category": "description", "text": "In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Die Fehler sind auf mehrere Speicherlecks, einen Puffer\u00fcberlauf, eine unzureichende Leistung und eine unzureichende Terminierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "153340", "T028133", "T025152", "T008027", "67646", "434967", "1039165", "T002965", "T012167", "T004914", "T014068", "T022954", "2951", "T002207", "T000126", "T001663", "398363", "T024775", "1727", "T021486", "T023373" ] }, "release_date": "2022-09-20T22:00:00Z", "title": "CVE-2022-2906" }, { "cve": "CVE-2022-3080", "notes": [ { "category": "description", "text": "In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Die Fehler sind auf mehrere Speicherlecks, einen Puffer\u00fcberlauf, eine unzureichende Leistung und eine unzureichende Terminierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "153340", "T028133", "T025152", "T008027", "67646", "434967", "1039165", "T002965", "T012167", "T004914", "T014068", "T022954", "2951", "T002207", "T000126", "T001663", "398363", "T024775", "1727", "T021486", "T023373" ] }, "release_date": "2022-09-20T22:00:00Z", "title": "CVE-2022-3080" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Die Fehler sind auf mehrere Speicherlecks, einen Puffer\u00fcberlauf, eine unzureichende Leistung und eine unzureichende Terminierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "153340", "T028133", "T025152", "T008027", "67646", "434967", "1039165", "T002965", "T012167", "T004914", "T014068", "T022954", "2951", "T002207", "T000126", "T001663", "398363", "T024775", "1727", "T021486", "T023373" ] }, "release_date": "2022-09-20T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Die Fehler sind auf mehrere Speicherlecks, einen Puffer\u00fcberlauf, eine unzureichende Leistung und eine unzureichende Terminierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "153340", "T028133", "T025152", "T008027", "67646", "434967", "1039165", "T002965", "T012167", "T004914", "T014068", "T022954", "2951", "T002207", "T000126", "T001663", "398363", "T024775", "1727", "T021486", "T023373" ] }, "release_date": "2022-09-20T22:00:00Z", "title": "CVE-2022-38178" } ] }
wid-sec-w-2022-1492
Vulnerability from csaf_certbund
Published
2022-09-20 22:00
Modified
2024-05-06 22:00
Summary
Internet Systems Consortium BIND: Mehrere Schwachstellen ermöglichen Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
BIND (Berkeley Internet Name Domain) ist ein Open-Source-Softwarepaket, das einen Domain-Name-System-Server implementiert.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Internet Systems Consortium BIND ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- Sonstiges
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "BIND (Berkeley Internet Name Domain) ist ein Open-Source-Softwarepaket, das einen Domain-Name-System-Server implementiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Internet Systems Consortium BIND ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1492 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1492.json" }, { "category": "self", "summary": "WID-SEC-2022-1492 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1492" }, { "category": "external", "summary": "BIND Release Notes vom 2022-09-20", "url": "https://downloads.isc.org/isc/bind9/9.16.33/doc/arm/html/notes.html" }, { "category": "external", "summary": "BIND Release Notes vom 2022-09-20", "url": "https://downloads.isc.org/isc/bind9/9.18.7/doc/arm/html/notes.html" }, { "category": "external", "summary": "BIND Release Notes vom 2022-09-20", "url": "https://downloads.isc.org/isc/bind9/9.19.1/doc/arm/html/notes.html" }, { "category": "external", "summary": "BIND Vulnerability Note vom 2022-09-20", "url": "https://kb.isc.org/docs/cve-2022-2795" }, { "category": "external", "summary": "BIND Vulnerability Note vom 2022-09-20", "url": "https://kb.isc.org/docs/cve-2022-2881" }, { "category": "external", "summary": "BIND Vulnerability Note vom 2022-09-20", "url": "https://kb.isc.org/docs/cve-2022-2906" }, { "category": "external", "summary": "BIND Vulnerability Note vom 2022-09-20", "url": "https://kb.isc.org/docs/cve-2022-3080" }, { "category": "external", "summary": "BIND Vulnerability Note vom 2022-09-20", "url": "https://kb.isc.org/docs/cve-2022-38177" }, { "category": "external", "summary": "BIND Vulnerability Note vom 2022-09-20", "url": "https://kb.isc.org/docs/cve-2022-38178" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5626-2 vom 2022-09-21", "url": "https://ubuntu.com/security/notices/USN-5626-2" }, { "category": "external", "summary": "Infoblox Advisory CVE-2022-38177 and CVE-2022-38178 vom 2022-09-21", "url": "https://support.infoblox.com/s/article/CVE-2022-38177-and-CVE-2022-38178" }, { "category": "external", "summary": "Infoblox Advisory CVE-2022-2795 vom 2022-09-21", "url": "https://support.infoblox.com/s/article/CVE-2022-2795" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5626-1 vom 2022-09-21", "url": "https://ubuntu.com/security/notices/USN-5626-1" }, { "category": "external", "summary": "Debian Security Advisory DSA-5235 vom 2022-09-22", "url": "https://lists.debian.org/debian-security-announce/2022/msg00204.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5235 vom 2022-09-23", "url": "https://www.debian.org/security/2022/dsa-5235" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-6765 vom 2022-10-04", "url": "http://linux.oracle.com/errata/ELSA-2022-6765.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6763 vom 2022-10-03", "url": "https://access.redhat.com/errata/RHSA-2022:6763" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6764 vom 2022-10-03", "url": "https://access.redhat.com/errata/RHSA-2022:6764" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6765 vom 2022-10-03", "url": "https://access.redhat.com/errata/RHSA-2022:6765" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-6763 vom 2022-10-04", "url": "http://linux.oracle.com/errata/ELSA-2022-6763.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-6778 vom 2022-10-05", "url": "https://linux.oracle.com/errata/ELSA-2022-6778.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6778 vom 2022-10-04", "url": "https://access.redhat.com/errata/RHSA-2022:6778" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6779 vom 2022-10-04", "url": "https://access.redhat.com/errata/RHSA-2022:6779" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6780 vom 2022-10-04", "url": "https://access.redhat.com/errata/RHSA-2022:6780" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6781 vom 2022-10-04", "url": "https://access.redhat.com/errata/RHSA-2022:6781" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3499-1 vom 2022-10-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012492.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3500-1 vom 2022-10-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012484.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-6781 vom 2022-10-05", "url": "https://linux.oracle.com/errata/ELSA-2022-6781.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3138 vom 2022-10-05", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html" }, { "category": "external", "summary": "Oracle Solaris Third Party Bulletin-October 2022 vom 2022-10-18", "url": "https://www.oracle.com/security-alerts/bulletinoct2022.html" }, { "category": "external", "summary": "Oracle Linux Bulletin-October 2022 vom 2022-10-18", "url": "https://www.oracle.com/security-alerts/linuxbulletinoct2022.html" }, { "category": "external", "summary": "F5 Security Advisory K27155546 vom 2022-10-19", "url": "https://support.f5.com/csp/article/K27155546" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6905 vom 2022-10-19", "url": "https://access.redhat.com/errata/RHSA-2022:6905" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3682-1 vom 2022-10-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012598.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3729-1 vom 2022-10-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012671.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3767-1 vom 2022-10-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-October/012698.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2022:6765 vom 2022-10-26", "url": "https://lists.centos.org/pipermail/centos-announce/2022-October/073648.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202210-25 vom 2022-10-31", "url": "https://security.gentoo.org/glsa/202210-25" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7643 vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7643" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8598 vom 2022-11-22", "url": "https://access.redhat.com/errata/RHSA-2022:8598" }, { "category": "external", "summary": "F5 Security Advisory K11742512 vom 2022-11-28", "url": "https://support.f5.com/csp/article/K11742512" }, { "category": "external", "summary": "IBM Security Bulletin 6851445 vom 2022-12-22", "url": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20221228-0009 vom 2022-12-28", "url": "https://security.netapp.com/advisory/ntap-20221228-0009/" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20221228-0010 vom 2022-12-28", "url": "https://security.netapp.com/advisory/ntap-20221228-0010/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-0402 vom 2023-01-24", "url": "http://linux.oracle.com/errata/ELSA-2023-0402.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0402 vom 2023-01-24", "url": "https://access.redhat.com/errata/RHSA-2023:0402" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-0402 vom 2023-01-24", "url": "https://linux.oracle.com/errata/ELSA-2023-0402.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2023:0402 vom 2023-01-30", "url": "https://lists.centos.org/pipermail/centos-announce/2023-January/086358.html" }, { "category": "external", "summary": "IBM Security Bulletin 6955057 vom 2023-02-13", "url": "https://www.ibm.com/support/pages/node/6955057" }, { "category": "external", "summary": "IBM Security Bulletin 7094965 vom 2023-12-11", "url": "https://www.ibm.com/support/pages/node/7094965" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-2001 vom 2023-03-22", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2001.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:2261 vom 2023-05-09", "url": "https://access.redhat.com/errata/RHSA-2023:2261" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3002 vom 2023-05-16", "url": "https://access.redhat.com/errata/RHSA-2023:3002" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:2792 vom 2023-05-16", "url": "https://access.redhat.com/errata/RHSA-2023:2792" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-2792 vom 2023-05-24", "url": "https://linux.oracle.com/errata/ELSA-2023-2792.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-3002 vom 2023-05-24", "url": "https://linux.oracle.com/errata/ELSA-2023-3002.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3609 vom 2023-06-15", "url": "https://access.redhat.com/errata/RHSA-2023:3609" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2720 vom 2024-05-07", "url": "https://access.redhat.com/errata/RHSA-2024:2720" } ], "source_lang": "en-US", "title": "Internet Systems Consortium BIND: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2024-05-06T22:00:00.000+00:00", "generator": { "date": "2024-05-07T11:33:18.031+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1492", "initial_release_date": "2022-09-20T22:00:00.000+00:00", "revision_history": [ { "date": "2022-09-20T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-09-21T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-09-22T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-10-03T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2022-10-04T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Oracle Linux, Red Hat und SUSE aufgenommen" }, { "date": "2022-10-05T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-10-18T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates aufgenommen" }, { "date": "2022-10-19T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von F5 und Red Hat aufgenommen" }, { "date": "2022-10-23T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-10-25T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-10-26T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE und CentOS aufgenommen" }, { "date": "2022-10-30T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2022-11-08T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-22T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-28T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2022-12-22T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von IBM und IBM-APAR aufgenommen" }, { "date": "2022-12-28T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2023-01-24T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2023-01-30T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2023-02-13T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-03-21T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-05-09T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-05-16T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-05-23T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-06-14T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-12-11T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-05-06T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "27" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7.1", "product": { "name": "IBM AIX 7.1", "product_id": "153340", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:7.1" } } }, { "category": "product_version", "name": "7.2", "product": { "name": "IBM AIX 7.2", "product_id": "434967", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:7.2" } } }, { "category": "product_version", "name": "7.3", "product": { "name": "IBM AIX 7.3", "product_id": "T021486", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:7.3" } } } ], "category": "product_name", "name": "AIX" }, { "branches": [ { "category": "product_version", "name": "v10", "product": { "name": "IBM Power Hardware Management Console v10", "product_id": "T023373", "product_identification_helper": { "cpe": "cpe:/a:ibm:hardware_management_console:v10" } } } ], "category": "product_name", "name": "Power Hardware Management Console" }, { "branches": [ { "category": "product_version", "name": "7.5", "product": { "name": "IBM QRadar SIEM 7.5", "product_id": "T022954", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5" } } }, { "category": "product_version", "name": "7.4", "product": { "name": "IBM QRadar SIEM 7.4", "product_id": "T024775", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.4" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version", "name": "3.1", "product": { "name": "IBM VIOS 3.1", "product_id": "1039165", "product_identification_helper": { "cpe": "cpe:/a:ibm:vios:3.1" } } } ], "category": "product_name", "name": "VIOS" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Infoblox NIOS", "product": { "name": "Infoblox NIOS", "product_id": "T014068", "product_identification_helper": { "cpe": "cpe:/o:infoblox:nios:-" } } } ], "category": "vendor", "name": "Infoblox" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 9.16.33", "product": { "name": "Internet Systems Consortium BIND \u003c 9.16.33", "product_id": "T024677", "product_identification_helper": { "cpe": "cpe:/a:isc:bind:9.16.33" } } }, { "category": "product_version_range", "name": "\u003c 9.18.7", "product": { "name": "Internet Systems Consortium BIND \u003c 9.18.7", "product_id": "T024678", "product_identification_helper": { "cpe": "cpe:/a:isc:bind:9.18.7" } } }, { "category": "product_version_range", "name": "\u003c 9.19.1", "product": { "name": "Internet Systems Consortium BIND \u003c 9.19.1", "product_id": "T024679", "product_identification_helper": { "cpe": "cpe:/a:isc:bind:9.19.1" } } } ], "category": "product_name", "name": "BIND" } ], "category": "vendor", "name": "Internet Systems Consortium" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "for VMware vSphere", "product": { "name": "NetApp ActiveIQ Unified Manager for VMware vSphere", "product_id": "T025152", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere" } } } ], "category": "product_name", "name": "ActiveIQ Unified Manager" } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } }, { "category": "product_name", "name": "Oracle Solaris", "product": { "name": "Oracle Solaris", "product_id": "T002965", "product_identification_helper": { "cpe": "cpe:/a:oracle:solaris:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift", "product": { "name": "Red Hat OpenShift", "product_id": "T008027", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:-" } } }, { "category": "product_version", "name": "Data Foundation 4", "product": { "name": "Red Hat OpenShift Data Foundation 4", "product_id": "T028133", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:data_foundation_4" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Die Fehler sind auf mehrere Speicherlecks, einen Puffer\u00fcberlauf, eine unzureichende Leistung und eine unzureichende Terminierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "153340", "T028133", "T025152", "T008027", "67646", "434967", "1039165", "T002965", "T012167", "T004914", "T014068", "T022954", "2951", "T002207", "T000126", "T001663", "398363", "T024775", "1727", "T021486", "T023373" ] }, "release_date": "2022-09-20T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-2881", "notes": [ { "category": "description", "text": "In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Die Fehler sind auf mehrere Speicherlecks, einen Puffer\u00fcberlauf, eine unzureichende Leistung und eine unzureichende Terminierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "153340", "T028133", "T025152", "T008027", "67646", "434967", "1039165", "T002965", "T012167", "T004914", "T014068", "T022954", "2951", "T002207", "T000126", "T001663", "398363", "T024775", "1727", "T021486", "T023373" ] }, "release_date": "2022-09-20T22:00:00Z", "title": "CVE-2022-2881" }, { "cve": "CVE-2022-2906", "notes": [ { "category": "description", "text": "In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Die Fehler sind auf mehrere Speicherlecks, einen Puffer\u00fcberlauf, eine unzureichende Leistung und eine unzureichende Terminierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "153340", "T028133", "T025152", "T008027", "67646", "434967", "1039165", "T002965", "T012167", "T004914", "T014068", "T022954", "2951", "T002207", "T000126", "T001663", "398363", "T024775", "1727", "T021486", "T023373" ] }, "release_date": "2022-09-20T22:00:00Z", "title": "CVE-2022-2906" }, { "cve": "CVE-2022-3080", "notes": [ { "category": "description", "text": "In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Die Fehler sind auf mehrere Speicherlecks, einen Puffer\u00fcberlauf, eine unzureichende Leistung und eine unzureichende Terminierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "153340", "T028133", "T025152", "T008027", "67646", "434967", "1039165", "T002965", "T012167", "T004914", "T014068", "T022954", "2951", "T002207", "T000126", "T001663", "398363", "T024775", "1727", "T021486", "T023373" ] }, "release_date": "2022-09-20T22:00:00Z", "title": "CVE-2022-3080" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Die Fehler sind auf mehrere Speicherlecks, einen Puffer\u00fcberlauf, eine unzureichende Leistung und eine unzureichende Terminierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "153340", "T028133", "T025152", "T008027", "67646", "434967", "1039165", "T002965", "T012167", "T004914", "T014068", "T022954", "2951", "T002207", "T000126", "T001663", "398363", "T024775", "1727", "T021486", "T023373" ] }, "release_date": "2022-09-20T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Internet Systems Consortium BIND existieren mehrere Schwachstellen. Die Fehler sind auf mehrere Speicherlecks, einen Puffer\u00fcberlauf, eine unzureichende Leistung und eine unzureichende Terminierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "153340", "T028133", "T025152", "T008027", "67646", "434967", "1039165", "T002965", "T012167", "T004914", "T014068", "T022954", "2951", "T002207", "T000126", "T001663", "398363", "T024775", "1727", "T021486", "T023373" ] }, "release_date": "2022-09-20T22:00:00Z", "title": "CVE-2022-38178" } ] }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Published
2024-04-04 22:00
Modified
2024-04-04 22:00
Summary
Dell ECS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell ECS ist ein Objektspeichersystem.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
gsd-2022-38178
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-38178", "description": "By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.", "id": "GSD-2022-38178", "references": [ "https://www.debian.org/security/2022/dsa-5235", "https://advisories.mageia.org/CVE-2022-38178.html", "https://access.redhat.com/errata/RHSA-2022:6763", "https://access.redhat.com/errata/RHSA-2022:6764", "https://access.redhat.com/errata/RHSA-2022:6765", "https://access.redhat.com/errata/RHSA-2022:6778", "https://access.redhat.com/errata/RHSA-2022:6779", "https://access.redhat.com/errata/RHSA-2022:6780", "https://access.redhat.com/errata/RHSA-2022:6781", "https://access.redhat.com/errata/RHSA-2022:8598", "https://www.suse.com/security/cve/CVE-2022-38178.html", "https://ubuntu.com/security/CVE-2022-38178", "https://security.archlinux.org/CVE-2022-38178" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-38178" ], "details": "By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.", "id": "GSD-2022-38178", "modified": "2023-12-13T01:19:22.347595Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-officer@isc.org", "DATE_PUBLIC": "2022-09-21T09:39:29.000Z", "ID": "CVE-2022-38178", "STATE": "PUBLIC", "TITLE": "Memory leaks in EdDSA DNSSEC verification code" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "BIND9", "version": { "version_data": [ { "version_name": "Open Source Branch 9.9", "version_value": "9.9.12 through versions up to and including 9.9.13" }, { "version_name": "Open Source Branch 9.10", "version_value": "9.10.7 through versions up to and including 9.10.8" }, { "version_name": "Open Source Branches 9.11 through 9.16", "version_value": "9.11.3 through versions before 9.16.33" }, { "version_name": "Open Source Branch 9.18", "version_value": "9.18.0 through versions before 9.18.7" }, { "version_name": "Supported Preview Branch 9.11-S", "version_value": "9.11.4-S1 through versions up to and including 9.11.37-S1" }, { "version_name": "Supported Preview Branch 9.16-S", "version_value": "9.16.8-S1 through versions before 9.16.33-S1" }, { "version_name": "Development Branch 9.19", "version_value": "9.19.0 through versions before 9.19.5" } ] } } ] }, "vendor_name": "ISC" } ] } }, "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources." } ] }, "exploit": [ { "lang": "eng", "value": "This flaw was discovered in internal testing. We are not aware of any active exploits." } ], "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "In BIND 9.9.12 -\u003e 9.9.13, 9.10.7 -\u003e 9.10.8, 9.11.3 -\u003e 9.16.32, 9.18.0 -\u003e 9.18.6, versions 9.11.4-S1 -\u003e 9.11.37-S1, 9.16.8-S1 -\u003e 9.16.32-S1 of the BIND Supported Preview Edition, and versions 9.19.0 -\u003e 9.19.4 of the BIND 9.19 development branch, the DNSSEC verification code for the EdDSA algorithm leaks memory when there is a signature length mismatch." } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.isc.org/docs/cve-2022-38178", "refsource": "CONFIRM", "url": "https://kb.isc.org/docs/cve-2022-38178" }, { "name": "[oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/09/21/3" }, { "name": "DSA-5235", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2022/dsa-5235" }, { "name": "FEDORA-2022-ef038365de", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/" }, { "name": "FEDORA-2022-8268735e06", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/" }, { "name": "FEDORA-2022-b197d64471", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/" }, { "name": "[debian-lts-announce] 20221005 [SECURITY] [DLA 3138-1] bind9 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html" }, { "name": "GLSA-202210-25", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202210-25" }, { "name": "https://security.netapp.com/advisory/ntap-20221228-0009/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20221228-0009/" } ] }, "solution": [ { "lang": "eng", "value": "Upgrade to the patched release most closely related to your current version of BIND: BIND 9.16.33, BIND 9.18.7, BIND 9.19.5, or for BIND Supported Preview Edition (a special feature preview branch of BIND provided to eligible ISC support customers): BIND 9.16.33-S1." } ], "source": { "discovery": "INTERNAL" }, "work_around": [ { "lang": "eng", "value": "Disable the following algorithms in your configuration using the disable-algorithms option: ED25519, ED448. Note that this causes zones signed with these algorithms to be treated as insecure." } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.10.8", "versionStartIncluding": "9.10.7", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.11.7:s1:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.11.3:s1:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.11.5:s3:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.11.5:s3:*:*:*:supported_preview:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.11.5:s6:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.11.12:s1:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.11.8:s1:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.9.13", "versionStartIncluding": "9.9.12", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.11.21:s1:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.16.8:s1:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.16.11:s1:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.11.27:s1:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.16.13:s1:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.11.29:s1:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.16.21:s1:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.11.35:s1:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.11.14-s1:*:*:*:preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.11.19-s1:*:*:*:preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.11.37:s1:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.16.32:s1:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.11.3:s4:*:*:supported_preview:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.16.32", "versionStartIncluding": "9.11.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security-officer@isc.org", "ID": "CVE-2022-38178" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-347" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.isc.org/docs/cve-2022-38178", "refsource": "CONFIRM", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://kb.isc.org/docs/cve-2022-38178" }, { "name": "[oss-security] 20220921 ISC has disclosed six vulnerabilities in BIND (CVE-2022-2795, CVE-2022-2881, CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, CVE-2022-38178)", "refsource": "MLIST", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/09/21/3" }, { "name": "DSA-5235", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5235" }, { "name": "FEDORA-2022-ef038365de", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/" }, { "name": "FEDORA-2022-8268735e06", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/" }, { "name": "FEDORA-2022-b197d64471", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/" }, { "name": "[debian-lts-announce] 20221005 [SECURITY] [DLA 3138-1] bind9 security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html" }, { "name": "GLSA-202210-25", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-25" }, { "name": "https://security.netapp.com/advisory/ntap-20221228-0009/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221228-0009/" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-03-01T16:34Z", "publishedDate": "2022-09-21T11:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.