Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-27220 (GCVE-0-2025-27220)
Vulnerability from cvelistv5 – Published: 2025-03-03 00:00 – Updated: 2025-11-03 21:13- CWE-1333 - Inefficient Regular Expression Complexity
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-27220",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-04T16:39:36.614961Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-04T16:40:22.900Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T21:13:25.250Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00008.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CGI",
"vendor": "ruby-lang",
"versions": [
{
"lessThan": "0.3.5.1",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "0.3.7",
"status": "affected",
"version": "0.3.6",
"versionType": "custom"
},
{
"lessThan": "0.4.2",
"status": "affected",
"version": "0.4.0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ruby-lang:cgi:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.3.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:cgi:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.3.7",
"versionStartIncluding": "0.3.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:cgi:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.4.2",
"versionStartIncluding": "0.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1333",
"description": "CWE-1333 Inefficient Regular Expression Complexity",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-03T23:46:21.977Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://hackerone.com/reports/2890322"
},
{
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cgi/CVE-2025-27220.yml"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2025-27220",
"datePublished": "2025-03-03T00:00:00.000Z",
"dateReserved": "2025-02-20T00:00:00.000Z",
"dateUpdated": "2025-11-03T21:13:25.250Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-27220\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2025-03-04T00:15:31.693\",\"lastModified\":\"2025-11-03T22:18:43.610\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method.\"},{\"lang\":\"es\",\"value\":\"En la gema CGI anterior a 0.4.2 para Ruby, existe una vulnerabilidad de denegaci\u00f3n de servicio de expresi\u00f3n regular (ReDoS) en el m\u00e9todo Util#escapeElement.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L\",\"baseScore\":4.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.2,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1333\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1333\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:cgi:*:*:*:*:*:ruby:*:*\",\"versionEndExcluding\":\"0.3.5.1\",\"matchCriteriaId\":\"E7161F63-FEE1-4803-A460-FE87E323B05D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:cgi:*:*:*:*:*:ruby:*:*\",\"versionStartIncluding\":\"0.4.0\",\"versionEndExcluding\":\"0.4.2\",\"matchCriteriaId\":\"A30117BA-C46E-44BB-A581-86E43F37D6E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:cgi:0.3.6:*:*:*:*:ruby:*:*\",\"matchCriteriaId\":\"8AE1C5F9-0743-49A2-8292-0018FEEF81E0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD748C02-1E5E-4D92-9C41-2BF953874C32\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8850AECE-0966-403B-A0D8-694C3ECE39D4\"}]}]}],\"references\":[{\"url\":\"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cgi/CVE-2025-27220.yml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://hackerone.com/reports/2890322\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/03/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-27220\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-04T16:39:36.614961Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-04T16:39:42.974Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 4, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L\"}}], \"affected\": [{\"vendor\": \"ruby-lang\", \"product\": \"CGI\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"0.3.5.1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0.3.6\", \"lessThan\": \"0.3.7\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0.4.0\", \"lessThan\": \"0.4.2\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://hackerone.com/reports/2890322\"}, {\"url\": \"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cgi/CVE-2025-27220.yml\"}], \"x_generator\": {\"engine\": \"enrichogram 0.0.1\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1333\", \"description\": \"CWE-1333 Inefficient Regular Expression Complexity\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:ruby-lang:cgi:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"0.3.5.1\"}, {\"criteria\": \"cpe:2.3:a:ruby-lang:cgi:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"0.3.7\", \"versionStartIncluding\": \"0.3.6\"}, {\"criteria\": \"cpe:2.3:a:ruby-lang:cgi:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"0.4.2\", \"versionStartIncluding\": \"0.4.0\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2025-03-03T23:46:21.977Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-27220\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-04T16:40:22.900Z\", \"dateReserved\": \"2025-02-20T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2025-03-03T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
SUSE-SU-2025:1369-1
Vulnerability from csaf_suse - Published: 2025-04-24 17:11 - Updated: 2025-04-24 17:11Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ruby2.5",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ruby2.5 fixes the following issues:\n\n- CVE-2025-27219: Fixed denial of service in CGI::Cookie.parse (bsc#1237804) \n- CVE-2025-27220: Fixed ReDoS in CGI::Util#escapeElement (bsc#1237806)\n \nOther fixes:\n- Improved fix for CVE-2024-47220 (bsc#1230930, bsc#1235773) \n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-1369,SUSE-SLE-Module-Basesystem-15-SP6-2025-1369,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1369,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1369,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1369,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1369,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1369,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1369,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1369,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1369,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1369,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1369,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1369,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1369,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1369,SUSE-Storage-7.1-2025-1369,openSUSE-SLE-15.6-2025-1369",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_1369-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:1369-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251369-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:1369-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-April/039080.html"
},
{
"category": "self",
"summary": "SUSE Bug 1230930",
"url": "https://bugzilla.suse.com/1230930"
},
{
"category": "self",
"summary": "SUSE Bug 1235773",
"url": "https://bugzilla.suse.com/1235773"
},
{
"category": "self",
"summary": "SUSE Bug 1237804",
"url": "https://bugzilla.suse.com/1237804"
},
{
"category": "self",
"summary": "SUSE Bug 1237806",
"url": "https://bugzilla.suse.com/1237806"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47220 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27219 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27219/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27220 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27220/"
}
],
"title": "Security update for ruby2.5",
"tracking": {
"current_release_date": "2025-04-24T17:11:21Z",
"generator": {
"date": "2025-04-24T17:11:21Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:1369-1",
"initial_release_date": "2025-04-24T17:11:21Z",
"revision_history": [
{
"date": "2025-04-24T17:11:21Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"product": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"product_id": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "ruby2.5-2.5.9-150000.4.41.1.aarch64",
"product": {
"name": "ruby2.5-2.5.9-150000.4.41.1.aarch64",
"product_id": "ruby2.5-2.5.9-150000.4.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"product": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"product_id": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"product": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"product_id": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "ruby2.5-doc-2.5.9-150000.4.41.1.aarch64",
"product": {
"name": "ruby2.5-doc-2.5.9-150000.4.41.1.aarch64",
"product_id": "ruby2.5-doc-2.5.9-150000.4.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"product": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"product_id": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.i586",
"product": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.i586",
"product_id": "libruby2_5-2_5-2.5.9-150000.4.41.1.i586"
}
},
{
"category": "product_version",
"name": "ruby2.5-2.5.9-150000.4.41.1.i586",
"product": {
"name": "ruby2.5-2.5.9-150000.4.41.1.i586",
"product_id": "ruby2.5-2.5.9-150000.4.41.1.i586"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.i586",
"product": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.i586",
"product_id": "ruby2.5-devel-2.5.9-150000.4.41.1.i586"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.i586",
"product": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.i586",
"product_id": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.i586"
}
},
{
"category": "product_version",
"name": "ruby2.5-doc-2.5.9-150000.4.41.1.i586",
"product": {
"name": "ruby2.5-doc-2.5.9-150000.4.41.1.i586",
"product_id": "ruby2.5-doc-2.5.9-150000.4.41.1.i586"
}
},
{
"category": "product_version",
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.i586",
"product": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.i586",
"product_id": "ruby2.5-stdlib-2.5.9-150000.4.41.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby2.5-doc-ri-2.5.9-150000.4.41.1.noarch",
"product": {
"name": "ruby2.5-doc-ri-2.5.9-150000.4.41.1.noarch",
"product_id": "ruby2.5-doc-ri-2.5.9-150000.4.41.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"product": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"product_id": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"product": {
"name": "ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"product_id": "ruby2.5-2.5.9-150000.4.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"product": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"product_id": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"product": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"product_id": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ruby2.5-doc-2.5.9-150000.4.41.1.ppc64le",
"product": {
"name": "ruby2.5-doc-2.5.9-150000.4.41.1.ppc64le",
"product_id": "ruby2.5-doc-2.5.9-150000.4.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"product": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"product_id": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"product": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"product_id": "libruby2_5-2_5-2.5.9-150000.4.41.1.s390x"
}
},
{
"category": "product_version",
"name": "ruby2.5-2.5.9-150000.4.41.1.s390x",
"product": {
"name": "ruby2.5-2.5.9-150000.4.41.1.s390x",
"product_id": "ruby2.5-2.5.9-150000.4.41.1.s390x"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"product": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"product_id": "ruby2.5-devel-2.5.9-150000.4.41.1.s390x"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"product": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"product_id": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x"
}
},
{
"category": "product_version",
"name": "ruby2.5-doc-2.5.9-150000.4.41.1.s390x",
"product": {
"name": "ruby2.5-doc-2.5.9-150000.4.41.1.s390x",
"product_id": "ruby2.5-doc-2.5.9-150000.4.41.1.s390x"
}
},
{
"category": "product_version",
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"product": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"product_id": "ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"product": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"product_id": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "ruby2.5-2.5.9-150000.4.41.1.x86_64",
"product": {
"name": "ruby2.5-2.5.9-150000.4.41.1.x86_64",
"product_id": "ruby2.5-2.5.9-150000.4.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"product": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"product_id": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"product": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"product_id": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "ruby2.5-doc-2.5.9-150000.4.41.1.x86_64",
"product": {
"name": "ruby2.5-doc-2.5.9-150000.4.41.1.x86_64",
"product_id": "ruby2.5-doc-2.5.9-150000.4.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"product": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"product_id": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150000.4.41.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-doc-2.5.9-150000.4.41.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-doc-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-doc-2.5.9-150000.4.41.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-doc-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-doc-2.5.9-150000.4.41.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-doc-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-doc-2.5.9-150000.4.41.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-doc-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-doc-ri-2.5.9-150000.4.41.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-doc-ri-2.5.9-150000.4.41.1.noarch"
},
"product_reference": "ruby2.5-doc-ri-2.5.9-150000.4.41.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47220"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., \"GET /admin HTTP/1.1\\r\\n\" inside of a \"POST /user HTTP/1.1\\r\\n\" request. NOTE: the supplier\u0027s position is \"Webrick should not be used in production.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-doc-ri-2.5.9-150000.4.41.1.noarch",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47220",
"url": "https://www.suse.com/security/cve/CVE-2024-47220"
},
{
"category": "external",
"summary": "SUSE Bug 1230930 for CVE-2024-47220",
"url": "https://bugzilla.suse.com/1230930"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-doc-ri-2.5.9-150000.4.41.1.noarch",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-doc-ri-2.5.9-150000.4.41.1.noarch",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-04-24T17:11:21Z",
"details": "important"
}
],
"title": "CVE-2024-47220"
},
{
"cve": "CVE-2025-27219",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27219"
}
],
"notes": [
{
"category": "general",
"text": "In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The method does not impose any limit on the length of the raw cookie value it processes. This oversight can lead to excessive resource consumption when parsing extremely large cookies.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-doc-ri-2.5.9-150000.4.41.1.noarch",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27219",
"url": "https://www.suse.com/security/cve/CVE-2025-27219"
},
{
"category": "external",
"summary": "SUSE Bug 1237804 for CVE-2025-27219",
"url": "https://bugzilla.suse.com/1237804"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-doc-ri-2.5.9-150000.4.41.1.noarch",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-doc-ri-2.5.9-150000.4.41.1.noarch",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-04-24T17:11:21Z",
"details": "moderate"
}
],
"title": "CVE-2025-27219"
},
{
"cve": "CVE-2025-27220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27220"
}
],
"notes": [
{
"category": "general",
"text": "In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-doc-ri-2.5.9-150000.4.41.1.noarch",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27220",
"url": "https://www.suse.com/security/cve/CVE-2025-27220"
},
{
"category": "external",
"summary": "SUSE Bug 1237806 for CVE-2025-27220",
"url": "https://bugzilla.suse.com/1237806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-doc-ri-2.5.9-150000.4.41.1.noarch",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Enterprise Storage 7.1:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Proxy 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"SUSE Manager Server 4.3:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:libruby2_5-2_5-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-devel-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-devel-extra-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-doc-2.5.9-150000.4.41.1.x86_64",
"openSUSE Leap 15.6:ruby2.5-doc-ri-2.5.9-150000.4.41.1.noarch",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.aarch64",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.ppc64le",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.s390x",
"openSUSE Leap 15.6:ruby2.5-stdlib-2.5.9-150000.4.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-04-24T17:11:21Z",
"details": "moderate"
}
],
"title": "CVE-2025-27220"
}
]
}
SUSE-SU-2025:4264-1
Vulnerability from csaf_suse - Published: 2025-11-26 15:52 - Updated: 2025-11-26 15:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ruby2.5",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ruby2.5 fixes the following issues:\n\n- CVE-2024-35221: Fixed remote DoS via YAML manifest (bsc#1225905)\n- CVE-2024-47220: Fixed HTTP request smuggling in WEBrick (bsc#1230930)\n- CVE-2024-49761: Fixed ReDOS vulnerability by updating REXML to 3.3.9 (bsc#1232440)\n- CVE-2025-24294: Fixed denial of service (DoS) caused by an insufficient check on the length \n of a decompressed domain name within a DNS packet in resolv gem (bsc#1246430)\n- CVE-2025-27219: Fixed denial of service in CGI::Cookie.parse (bsc#1237804)\n- CVE-2025-27220: Fixed ReDoS in CGI::Util#escapeElement (bsc#1237806)\n- CVE-2025-27221: Fixed userinfo leakage in URI#join, URI#merge and URI#+ (bsc#1237805)\n- CVE-2025-6442: Fixed ruby WEBrick read_header HTTP request smuggling vulnerability (bsc#1245254)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4264,SUSE-SLE-Module-Basesystem-15-SP7-2025-4264",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4264-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4264-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254264-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4264-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023374.html"
},
{
"category": "self",
"summary": "SUSE Bug 1225905",
"url": "https://bugzilla.suse.com/1225905"
},
{
"category": "self",
"summary": "SUSE Bug 1230930",
"url": "https://bugzilla.suse.com/1230930"
},
{
"category": "self",
"summary": "SUSE Bug 1232440",
"url": "https://bugzilla.suse.com/1232440"
},
{
"category": "self",
"summary": "SUSE Bug 1235773",
"url": "https://bugzilla.suse.com/1235773"
},
{
"category": "self",
"summary": "SUSE Bug 1237804",
"url": "https://bugzilla.suse.com/1237804"
},
{
"category": "self",
"summary": "SUSE Bug 1237805",
"url": "https://bugzilla.suse.com/1237805"
},
{
"category": "self",
"summary": "SUSE Bug 1237806",
"url": "https://bugzilla.suse.com/1237806"
},
{
"category": "self",
"summary": "SUSE Bug 1245254",
"url": "https://bugzilla.suse.com/1245254"
},
{
"category": "self",
"summary": "SUSE Bug 1246430",
"url": "https://bugzilla.suse.com/1246430"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35221 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47220 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-49761 page",
"url": "https://www.suse.com/security/cve/CVE-2024-49761/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-24294 page",
"url": "https://www.suse.com/security/cve/CVE-2025-24294/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27219 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27219/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27220 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27221 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6442 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6442/"
}
],
"title": "Security update for ruby2.5",
"tracking": {
"current_release_date": "2025-11-26T15:52:44Z",
"generator": {
"date": "2025-11-26T15:52:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4264-1",
"initial_release_date": "2025-11-26T15:52:44Z",
"revision_history": [
{
"date": "2025-11-26T15:52:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"product": {
"name": "libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"product_id": "libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "ruby2.5-2.5.9-150700.24.3.1.aarch64",
"product": {
"name": "ruby2.5-2.5.9-150700.24.3.1.aarch64",
"product_id": "ruby2.5-2.5.9-150700.24.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"product": {
"name": "ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"product_id": "ruby2.5-devel-2.5.9-150700.24.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"product": {
"name": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"product_id": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "ruby2.5-doc-2.5.9-150700.24.3.1.aarch64",
"product": {
"name": "ruby2.5-doc-2.5.9-150700.24.3.1.aarch64",
"product_id": "ruby2.5-doc-2.5.9-150700.24.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"product": {
"name": "ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"product_id": "ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libruby2_5-2_5-2.5.9-150700.24.3.1.i586",
"product": {
"name": "libruby2_5-2_5-2.5.9-150700.24.3.1.i586",
"product_id": "libruby2_5-2_5-2.5.9-150700.24.3.1.i586"
}
},
{
"category": "product_version",
"name": "ruby2.5-2.5.9-150700.24.3.1.i586",
"product": {
"name": "ruby2.5-2.5.9-150700.24.3.1.i586",
"product_id": "ruby2.5-2.5.9-150700.24.3.1.i586"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-2.5.9-150700.24.3.1.i586",
"product": {
"name": "ruby2.5-devel-2.5.9-150700.24.3.1.i586",
"product_id": "ruby2.5-devel-2.5.9-150700.24.3.1.i586"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.i586",
"product": {
"name": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.i586",
"product_id": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.i586"
}
},
{
"category": "product_version",
"name": "ruby2.5-doc-2.5.9-150700.24.3.1.i586",
"product": {
"name": "ruby2.5-doc-2.5.9-150700.24.3.1.i586",
"product_id": "ruby2.5-doc-2.5.9-150700.24.3.1.i586"
}
},
{
"category": "product_version",
"name": "ruby2.5-stdlib-2.5.9-150700.24.3.1.i586",
"product": {
"name": "ruby2.5-stdlib-2.5.9-150700.24.3.1.i586",
"product_id": "ruby2.5-stdlib-2.5.9-150700.24.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby2.5-doc-ri-2.5.9-150700.24.3.1.noarch",
"product": {
"name": "ruby2.5-doc-ri-2.5.9-150700.24.3.1.noarch",
"product_id": "ruby2.5-doc-ri-2.5.9-150700.24.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"product": {
"name": "libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"product_id": "libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"product": {
"name": "ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"product_id": "ruby2.5-2.5.9-150700.24.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"product": {
"name": "ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"product_id": "ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"product": {
"name": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"product_id": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ruby2.5-doc-2.5.9-150700.24.3.1.ppc64le",
"product": {
"name": "ruby2.5-doc-2.5.9-150700.24.3.1.ppc64le",
"product_id": "ruby2.5-doc-2.5.9-150700.24.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"product": {
"name": "ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"product_id": "ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"product": {
"name": "libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"product_id": "libruby2_5-2_5-2.5.9-150700.24.3.1.s390x"
}
},
{
"category": "product_version",
"name": "ruby2.5-2.5.9-150700.24.3.1.s390x",
"product": {
"name": "ruby2.5-2.5.9-150700.24.3.1.s390x",
"product_id": "ruby2.5-2.5.9-150700.24.3.1.s390x"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"product": {
"name": "ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"product_id": "ruby2.5-devel-2.5.9-150700.24.3.1.s390x"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"product": {
"name": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"product_id": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x"
}
},
{
"category": "product_version",
"name": "ruby2.5-doc-2.5.9-150700.24.3.1.s390x",
"product": {
"name": "ruby2.5-doc-2.5.9-150700.24.3.1.s390x",
"product_id": "ruby2.5-doc-2.5.9-150700.24.3.1.s390x"
}
},
{
"category": "product_version",
"name": "ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"product": {
"name": "ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"product_id": "ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"product": {
"name": "libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"product_id": "libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ruby2.5-2.5.9-150700.24.3.1.x86_64",
"product": {
"name": "ruby2.5-2.5.9-150700.24.3.1.x86_64",
"product_id": "ruby2.5-2.5.9-150700.24.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"product": {
"name": "ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"product_id": "ruby2.5-devel-2.5.9-150700.24.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"product": {
"name": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"product_id": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ruby2.5-doc-2.5.9-150700.24.3.1.x86_64",
"product": {
"name": "ruby2.5-doc-2.5.9-150700.24.3.1.x86_64",
"product_id": "ruby2.5-doc-2.5.9-150700.24.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64",
"product": {
"name": "ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64",
"product_id": "ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le"
},
"product_reference": "libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150700.24.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x"
},
"product_reference": "libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64"
},
"product_reference": "libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150700.24.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64"
},
"product_reference": "ruby2.5-2.5.9-150700.24.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150700.24.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le"
},
"product_reference": "ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150700.24.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x"
},
"product_reference": "ruby2.5-2.5.9-150700.24.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-2.5.9-150700.24.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64"
},
"product_reference": "ruby2.5-2.5.9-150700.24.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150700.24.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64"
},
"product_reference": "ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le"
},
"product_reference": "ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150700.24.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x"
},
"product_reference": "ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-2.5.9-150700.24.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64"
},
"product_reference": "ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64"
},
"product_reference": "ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
},
"product_reference": "ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-35221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35221"
}
],
"notes": [
{
"category": "general",
"text": "Rubygems.org is the Ruby community\u0027s gem hosting service. A Gem publisher can cause a Remote DoS when publishing a Gem. This is due to how Ruby reads the Manifest of Gem files when using Gem::Specification.from_yaml. from_yaml makes use of SafeYAML.load which allows YAML aliases inside the YAML-based metadata of a gem. YAML aliases allow for Denial of Service attacks with so-called `YAML-bombs` (comparable to Billion laughs attacks). This was patched. There is is no action required by users. This issue is also tracked as GHSL-2024-001 and was discovered by the GitHub security lab.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35221",
"url": "https://www.suse.com/security/cve/CVE-2024-35221"
},
{
"category": "external",
"summary": "SUSE Bug 1225905 for CVE-2024-35221",
"url": "https://bugzilla.suse.com/1225905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-26T15:52:44Z",
"details": "moderate"
}
],
"title": "CVE-2024-35221"
},
{
"cve": "CVE-2024-47220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47220"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the WEBrick toolkit through 1.8.1 for Ruby. It allows HTTP request smuggling by providing both a Content-Length header and a Transfer-Encoding header, e.g., \"GET /admin HTTP/1.1\\r\\n\" inside of a \"POST /user HTTP/1.1\\r\\n\" request. NOTE: the supplier\u0027s position is \"Webrick should not be used in production.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47220",
"url": "https://www.suse.com/security/cve/CVE-2024-47220"
},
{
"category": "external",
"summary": "SUSE Bug 1230930 for CVE-2024-47220",
"url": "https://bugzilla.suse.com/1230930"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-26T15:52:44Z",
"details": "important"
}
],
"title": "CVE-2024-47220"
},
{
"cve": "CVE-2024-49761",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-49761"
}
],
"notes": [
{
"category": "general",
"text": "REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between \u0026# and x...; in a hex numeric character reference (\u0026#x...;). This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. The REXML gem 3.3.9 or later include the patch to fix the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-49761",
"url": "https://www.suse.com/security/cve/CVE-2024-49761"
},
{
"category": "external",
"summary": "SUSE Bug 1232440 for CVE-2024-49761",
"url": "https://bugzilla.suse.com/1232440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-26T15:52:44Z",
"details": "moderate"
}
],
"title": "CVE-2024-49761"
},
{
"cve": "CVE-2025-24294",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-24294"
}
],
"notes": [
{
"category": "general",
"text": "The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet.\r\n\r\nAn attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name.\r\n\r\nThis resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-24294",
"url": "https://www.suse.com/security/cve/CVE-2025-24294"
},
{
"category": "external",
"summary": "SUSE Bug 1246430 for CVE-2025-24294",
"url": "https://bugzilla.suse.com/1246430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-26T15:52:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-24294"
},
{
"cve": "CVE-2025-27219",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27219"
}
],
"notes": [
{
"category": "general",
"text": "In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The method does not impose any limit on the length of the raw cookie value it processes. This oversight can lead to excessive resource consumption when parsing extremely large cookies.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27219",
"url": "https://www.suse.com/security/cve/CVE-2025-27219"
},
{
"category": "external",
"summary": "SUSE Bug 1237804 for CVE-2025-27219",
"url": "https://bugzilla.suse.com/1237804"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-26T15:52:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-27219"
},
{
"cve": "CVE-2025-27220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27220"
}
],
"notes": [
{
"category": "general",
"text": "In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27220",
"url": "https://www.suse.com/security/cve/CVE-2025-27220"
},
{
"category": "external",
"summary": "SUSE Bug 1237806 for CVE-2025-27220",
"url": "https://bugzilla.suse.com/1237806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-26T15:52:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-27220"
},
{
"cve": "CVE-2025-27221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27221"
}
],
"notes": [
{
"category": "general",
"text": "In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#merge, URI#+) have an inadvertent leakage of authentication credentials because userinfo is retained even after changing the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27221",
"url": "https://www.suse.com/security/cve/CVE-2025-27221"
},
{
"category": "external",
"summary": "SUSE Bug 1237805 for CVE-2025-27221",
"url": "https://bugzilla.suse.com/1237805"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-26T15:52:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-27221"
},
{
"cve": "CVE-2025-6442",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6442"
}
],
"notes": [
{
"category": "general",
"text": "Ruby WEBrick read_header HTTP Request Smuggling Vulnerability. This vulnerability allows remote attackers to smuggle arbitrary HTTP requests on affected installations of Ruby WEBrick. This issue is exploitable when the product is deployed behind an HTTP proxy that fulfills specific conditions.\n\nThe specific flaw exists within the read_headers method. The issue results from the inconsistent parsing of terminators of HTTP headers. An attacker can leverage this vulnerability to smuggle arbitrary HTTP requests. Was ZDI-CAN-21876.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6442",
"url": "https://www.suse.com/security/cve/CVE-2025-6442"
},
{
"category": "external",
"summary": "SUSE Bug 1245252 for CVE-2025-6442",
"url": "https://bugzilla.suse.com/1245252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libruby2_5-2_5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-devel-extra-2.5.9-150700.24.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-stdlib-2.5.9-150700.24.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-26T15:52:44Z",
"details": "moderate"
}
],
"title": "CVE-2025-6442"
}
]
}
MSRC_CVE-2025-27220
Vulnerability from csaf_microsoft - Published: 2025-03-02 00:00 - Updated: 2025-04-19 00:00Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27220 In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-27220.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method.",
"tracking": {
"current_release_date": "2025-04-19T00:00:00.000Z",
"generator": {
"date": "2025-10-20T03:02:47.303Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-27220",
"initial_release_date": "2025-03-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-03-19T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2025-04-19T00:00:00.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 ruby 3.1.4-9",
"product": {
"name": "\u003ccbl2 ruby 3.1.4-9",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 ruby 3.1.4-9",
"product": {
"name": "cbl2 ruby 3.1.4-9",
"product_id": "19723"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 ruby 3.3.5-3",
"product": {
"name": "\u003cazl3 ruby 3.3.5-3",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "azl3 ruby 3.3.5-3",
"product": {
"name": "azl3 ruby 3.3.5-3",
"product_id": "19393"
}
}
],
"category": "product_name",
"name": "ruby"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 ruby 3.1.4-9 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 ruby 3.1.4-9 as a component of CBL Mariner 2.0",
"product_id": "19723-17086"
},
"product_reference": "19723",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 ruby 3.3.5-3 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 ruby 3.3.5-3 as a component of Azure Linux 3.0",
"product_id": "19393-17084"
},
"product_reference": "19393",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-27220",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19723-17086",
"19393-17084"
],
"known_affected": [
"17086-1",
"17084-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27220 In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-27220.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-03-19T00:00:00.000Z",
"details": "3.1.4-9:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-03-19T00:00:00.000Z",
"details": "3.3.5-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"temporalScore": 4.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"17086-1",
"17084-2"
]
}
],
"title": "In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method."
}
]
}
RHSA-2025:4487
Vulnerability from csaf_redhat - Published: 2025-05-06 02:20 - Updated: 2025-11-21 19:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ruby is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.\n\nSecurity Fix(es):\n\n* CGI: ReDoS in CGI::Util#escapeElement (CVE-2025-27220)\n\n* CGI: Denial of Service in CGI::Cookie.parse (CVE-2025-27219)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:4487",
"url": "https://access.redhat.com/errata/RHSA-2025:4487"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2349696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349696"
},
{
"category": "external",
"summary": "2349699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349699"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_4487.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2025-11-21T19:34:37+00:00",
"generator": {
"date": "2025-11-21T19:34:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:4487",
"initial_release_date": "2025-05-06T02:20:21+00:00",
"revision_history": [
{
"date": "2025-05-06T02:20:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-05-06T02:20:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:34:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:3.0.7-165.el9_5.src",
"product": {
"name": "ruby-0:3.0.7-165.el9_5.src",
"product_id": "ruby-0:3.0.7-165.el9_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@3.0.7-165.el9_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:3.0.7-165.el9_5.aarch64",
"product": {
"name": "ruby-0:3.0.7-165.el9_5.aarch64",
"product_id": "ruby-0:3.0.7-165.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@3.0.7-165.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:3.0.7-165.el9_5.aarch64",
"product": {
"name": "ruby-devel-0:3.0.7-165.el9_5.aarch64",
"product_id": "ruby-devel-0:3.0.7-165.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@3.0.7-165.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:3.0.7-165.el9_5.aarch64",
"product": {
"name": "ruby-libs-0:3.0.7-165.el9_5.aarch64",
"product_id": "ruby-libs-0:3.0.7-165.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@3.0.7-165.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"product": {
"name": "rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"product_id": "rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal@3.0.0-165.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"product": {
"name": "rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"product_id": "rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console@0.5.7-165.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-0:2.5.1-165.el9_5.aarch64",
"product": {
"name": "rubygem-json-0:2.5.1-165.el9_5.aarch64",
"product_id": "rubygem-json-0:2.5.1-165.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json@2.5.1-165.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"product": {
"name": "rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"product_id": "rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych@3.3.2-165.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"product": {
"name": "ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"product_id": "ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@3.0.7-165.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"product": {
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"product_id": "ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@3.0.7-165.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"product": {
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"product_id": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@3.0.7-165.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"product_id": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@3.0.0-165.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"product_id": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.5.7-165.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"product": {
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"product_id": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.5.1-165.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"product": {
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"product_id": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@3.3.2-165.el9_5?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:3.0.7-165.el9_5.ppc64le",
"product": {
"name": "ruby-0:3.0.7-165.el9_5.ppc64le",
"product_id": "ruby-0:3.0.7-165.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@3.0.7-165.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"product": {
"name": "ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"product_id": "ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@3.0.7-165.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"product": {
"name": "ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"product_id": "ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@3.0.7-165.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"product": {
"name": "rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"product_id": "rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal@3.0.0-165.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"product": {
"name": "rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"product_id": "rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console@0.5.7-165.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"product": {
"name": "rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"product_id": "rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json@2.5.1-165.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"product": {
"name": "rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"product_id": "rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych@3.3.2-165.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"product": {
"name": "ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"product_id": "ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@3.0.7-165.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"product": {
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"product_id": "ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@3.0.7-165.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"product": {
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"product_id": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@3.0.7-165.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"product_id": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@3.0.0-165.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"product_id": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.5.7-165.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"product": {
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"product_id": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.5.1-165.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"product": {
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"product_id": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@3.3.2-165.el9_5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:3.0.7-165.el9_5.i686",
"product": {
"name": "ruby-0:3.0.7-165.el9_5.i686",
"product_id": "ruby-0:3.0.7-165.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@3.0.7-165.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:3.0.7-165.el9_5.i686",
"product": {
"name": "ruby-devel-0:3.0.7-165.el9_5.i686",
"product_id": "ruby-devel-0:3.0.7-165.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@3.0.7-165.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:3.0.7-165.el9_5.i686",
"product": {
"name": "ruby-libs-0:3.0.7-165.el9_5.i686",
"product_id": "ruby-libs-0:3.0.7-165.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@3.0.7-165.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:3.0.7-165.el9_5.i686",
"product": {
"name": "ruby-debugsource-0:3.0.7-165.el9_5.i686",
"product_id": "ruby-debugsource-0:3.0.7-165.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@3.0.7-165.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"product": {
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"product_id": "ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@3.0.7-165.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"product": {
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"product_id": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@3.0.7-165.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"product_id": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@3.0.0-165.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"product_id": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.5.7-165.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"product": {
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"product_id": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.5.1-165.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"product": {
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"product_id": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@3.3.2-165.el9_5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:3.0.7-165.el9_5.x86_64",
"product": {
"name": "ruby-0:3.0.7-165.el9_5.x86_64",
"product_id": "ruby-0:3.0.7-165.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@3.0.7-165.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:3.0.7-165.el9_5.x86_64",
"product": {
"name": "ruby-devel-0:3.0.7-165.el9_5.x86_64",
"product_id": "ruby-devel-0:3.0.7-165.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@3.0.7-165.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:3.0.7-165.el9_5.x86_64",
"product": {
"name": "ruby-libs-0:3.0.7-165.el9_5.x86_64",
"product_id": "ruby-libs-0:3.0.7-165.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@3.0.7-165.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"product": {
"name": "rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"product_id": "rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal@3.0.0-165.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"product": {
"name": "rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"product_id": "rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console@0.5.7-165.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-0:2.5.1-165.el9_5.x86_64",
"product": {
"name": "rubygem-json-0:2.5.1-165.el9_5.x86_64",
"product_id": "rubygem-json-0:2.5.1-165.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json@2.5.1-165.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"product": {
"name": "rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"product_id": "rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych@3.3.2-165.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"product": {
"name": "ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"product_id": "ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@3.0.7-165.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"product": {
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"product_id": "ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@3.0.7-165.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"product": {
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"product_id": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@3.0.7-165.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"product_id": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@3.0.0-165.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"product_id": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.5.7-165.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"product": {
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"product_id": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.5.1-165.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"product": {
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"product_id": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@3.3.2-165.el9_5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:3.0.7-165.el9_5.s390x",
"product": {
"name": "ruby-0:3.0.7-165.el9_5.s390x",
"product_id": "ruby-0:3.0.7-165.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@3.0.7-165.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:3.0.7-165.el9_5.s390x",
"product": {
"name": "ruby-devel-0:3.0.7-165.el9_5.s390x",
"product_id": "ruby-devel-0:3.0.7-165.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@3.0.7-165.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:3.0.7-165.el9_5.s390x",
"product": {
"name": "ruby-libs-0:3.0.7-165.el9_5.s390x",
"product_id": "ruby-libs-0:3.0.7-165.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@3.0.7-165.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"product": {
"name": "rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"product_id": "rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal@3.0.0-165.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"product": {
"name": "rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"product_id": "rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console@0.5.7-165.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-0:2.5.1-165.el9_5.s390x",
"product": {
"name": "rubygem-json-0:2.5.1-165.el9_5.s390x",
"product_id": "rubygem-json-0:2.5.1-165.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json@2.5.1-165.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-0:3.3.2-165.el9_5.s390x",
"product": {
"name": "rubygem-psych-0:3.3.2-165.el9_5.s390x",
"product_id": "rubygem-psych-0:3.3.2-165.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych@3.3.2-165.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"product": {
"name": "ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"product_id": "ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@3.0.7-165.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"product": {
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"product_id": "ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@3.0.7-165.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"product": {
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"product_id": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@3.0.7-165.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"product_id": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@3.0.0-165.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"product_id": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.5.7-165.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"product": {
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"product_id": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.5.1-165.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"product": {
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"product_id": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@3.3.2-165.el9_5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"product": {
"name": "ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"product_id": "ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-default-gems@3.0.7-165.el9_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"product": {
"name": "rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"product_id": "rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bundler@2.2.33-165.el9_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-irb-0:1.3.5-165.el9_5.noarch",
"product": {
"name": "rubygem-irb-0:1.3.5-165.el9_5.noarch",
"product_id": "rubygem-irb-0:1.3.5-165.el9_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-irb@1.3.5-165.el9_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"product": {
"name": "rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"product_id": "rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-minitest@5.14.2-165.el9_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"product": {
"name": "rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"product_id": "rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-power_assert@1.2.1-165.el9_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-rake-0:13.0.3-165.el9_5.noarch",
"product": {
"name": "rubygem-rake-0:13.0.3-165.el9_5.noarch",
"product_id": "rubygem-rake-0:13.0.3-165.el9_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rake@13.0.3-165.el9_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"product": {
"name": "rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"product_id": "rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs@1.4.0-165.el9_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"product": {
"name": "rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"product_id": "rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rdoc@6.3.4.1-165.el9_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"product": {
"name": "rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"product_id": "rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rexml@3.2.5-165.el9_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-rss-0:0.2.9-165.el9_5.noarch",
"product": {
"name": "rubygem-rss-0:0.2.9-165.el9_5.noarch",
"product_id": "rubygem-rss-0:0.2.9-165.el9_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rss@0.2.9-165.el9_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"product": {
"name": "rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"product_id": "rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-test-unit@3.3.7-165.el9_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"product": {
"name": "rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"product_id": "rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-typeprof@0.15.2-165.el9_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygems-0:3.2.33-165.el9_5.noarch",
"product": {
"name": "rubygems-0:3.2.33-165.el9_5.noarch",
"product_id": "rubygems-0:3.2.33-165.el9_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygems@3.2.33-165.el9_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygems-devel-0:3.2.33-165.el9_5.noarch",
"product": {
"name": "rubygems-devel-0:3.2.33-165.el9_5.noarch",
"product_id": "rubygems-devel-0:3.2.33-165.el9_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygems-devel@3.2.33-165.el9_5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ruby-doc-0:3.0.7-165.el9_5.noarch",
"product": {
"name": "ruby-doc-0:3.0.7-165.el9_5.noarch",
"product_id": "ruby-doc-0:3.0.7-165.el9_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-doc@3.0.7-165.el9_5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.0.7-165.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.aarch64"
},
"product_reference": "ruby-0:3.0.7-165.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.0.7-165.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.i686"
},
"product_reference": "ruby-0:3.0.7-165.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.0.7-165.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.ppc64le"
},
"product_reference": "ruby-0:3.0.7-165.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.0.7-165.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.s390x"
},
"product_reference": "ruby-0:3.0.7-165.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.0.7-165.el9_5.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.src"
},
"product_reference": "ruby-0:3.0.7-165.el9_5.src",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.0.7-165.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.x86_64"
},
"product_reference": "ruby-0:3.0.7-165.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.aarch64"
},
"product_reference": "ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.i686"
},
"product_reference": "ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le"
},
"product_reference": "ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.s390x"
},
"product_reference": "ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.x86_64"
},
"product_reference": "ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.0.7-165.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.aarch64"
},
"product_reference": "ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.0.7-165.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.i686"
},
"product_reference": "ruby-debugsource-0:3.0.7-165.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.0.7-165.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.ppc64le"
},
"product_reference": "ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.0.7-165.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.s390x"
},
"product_reference": "ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.0.7-165.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.x86_64"
},
"product_reference": "ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-default-gems-0:3.0.7-165.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.0.7-165.el9_5.noarch"
},
"product_reference": "ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.0.7-165.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.aarch64"
},
"product_reference": "ruby-devel-0:3.0.7-165.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.0.7-165.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.i686"
},
"product_reference": "ruby-devel-0:3.0.7-165.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.0.7-165.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.ppc64le"
},
"product_reference": "ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.0.7-165.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.s390x"
},
"product_reference": "ruby-devel-0:3.0.7-165.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.0.7-165.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.x86_64"
},
"product_reference": "ruby-devel-0:3.0.7-165.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-doc-0:3.0.7-165.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.0.7-165.el9_5.noarch"
},
"product_reference": "ruby-doc-0:3.0.7-165.el9_5.noarch",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.0.7-165.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.aarch64"
},
"product_reference": "ruby-libs-0:3.0.7-165.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.0.7-165.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.i686"
},
"product_reference": "ruby-libs-0:3.0.7-165.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.0.7-165.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.ppc64le"
},
"product_reference": "ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.0.7-165.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.s390x"
},
"product_reference": "ruby-libs-0:3.0.7-165.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.0.7-165.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.x86_64"
},
"product_reference": "ruby-libs-0:3.0.7-165.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64"
},
"product_reference": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686"
},
"product_reference": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le"
},
"product_reference": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x"
},
"product_reference": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64"
},
"product_reference": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64"
},
"product_reference": "rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le"
},
"product_reference": "rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x"
},
"product_reference": "rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64"
},
"product_reference": "rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bundler-0:2.2.33-165.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.2.33-165.el9_5.noarch"
},
"product_reference": "rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.5.7-165.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.aarch64"
},
"product_reference": "rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.5.7-165.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.ppc64le"
},
"product_reference": "rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.5.7-165.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.s390x"
},
"product_reference": "rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.5.7-165.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.x86_64"
},
"product_reference": "rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-irb-0:1.3.5-165.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.3.5-165.el9_5.noarch"
},
"product_reference": "rubygem-irb-0:1.3.5-165.el9_5.noarch",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.5.1-165.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.aarch64"
},
"product_reference": "rubygem-json-0:2.5.1-165.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.5.1-165.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.ppc64le"
},
"product_reference": "rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.5.1-165.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.s390x"
},
"product_reference": "rubygem-json-0:2.5.1-165.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.5.1-165.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.x86_64"
},
"product_reference": "rubygem-json-0:2.5.1-165.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64"
},
"product_reference": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686"
},
"product_reference": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le"
},
"product_reference": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x"
},
"product_reference": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64"
},
"product_reference": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-minitest-0:5.14.2-165.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.14.2-165.el9_5.noarch"
},
"product_reference": "rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-power_assert-0:1.2.1-165.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:1.2.1-165.el9_5.noarch"
},
"product_reference": "rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:3.3.2-165.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.aarch64"
},
"product_reference": "rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:3.3.2-165.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.ppc64le"
},
"product_reference": "rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:3.3.2-165.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.s390x"
},
"product_reference": "rubygem-psych-0:3.3.2-165.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:3.3.2-165.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.x86_64"
},
"product_reference": "rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64"
},
"product_reference": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686"
},
"product_reference": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le"
},
"product_reference": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x"
},
"product_reference": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64"
},
"product_reference": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rake-0:13.0.3-165.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.3-165.el9_5.noarch"
},
"product_reference": "rubygem-rake-0:13.0.3-165.el9_5.noarch",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-0:1.4.0-165.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:1.4.0-165.el9_5.noarch"
},
"product_reference": "rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch"
},
"product_reference": "rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rexml-0:3.2.5-165.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.2.5-165.el9_5.noarch"
},
"product_reference": "rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rss-0:0.2.9-165.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.2.9-165.el9_5.noarch"
},
"product_reference": "rubygem-rss-0:0.2.9-165.el9_5.noarch",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-test-unit-0:3.3.7-165.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.3.7-165.el9_5.noarch"
},
"product_reference": "rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-typeprof-0:0.15.2-165.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.15.2-165.el9_5.noarch"
},
"product_reference": "rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygems-0:3.2.33-165.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygems-0:3.2.33-165.el9_5.noarch"
},
"product_reference": "rubygems-0:3.2.33-165.el9_5.noarch",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygems-devel-0:3.2.33-165.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.2.33-165.el9_5.noarch"
},
"product_reference": "rubygems-devel-0:3.2.33-165.el9_5.noarch",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.0.7-165.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.aarch64"
},
"product_reference": "ruby-0:3.0.7-165.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.0.7-165.el9_5.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.i686"
},
"product_reference": "ruby-0:3.0.7-165.el9_5.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.0.7-165.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.ppc64le"
},
"product_reference": "ruby-0:3.0.7-165.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.0.7-165.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.s390x"
},
"product_reference": "ruby-0:3.0.7-165.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.0.7-165.el9_5.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.src"
},
"product_reference": "ruby-0:3.0.7-165.el9_5.src",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.0.7-165.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.x86_64"
},
"product_reference": "ruby-0:3.0.7-165.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.aarch64"
},
"product_reference": "ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.i686"
},
"product_reference": "ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le"
},
"product_reference": "ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.s390x"
},
"product_reference": "ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.0.7-165.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.x86_64"
},
"product_reference": "ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.0.7-165.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.aarch64"
},
"product_reference": "ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.0.7-165.el9_5.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.i686"
},
"product_reference": "ruby-debugsource-0:3.0.7-165.el9_5.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.0.7-165.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.ppc64le"
},
"product_reference": "ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.0.7-165.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.s390x"
},
"product_reference": "ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.0.7-165.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.x86_64"
},
"product_reference": "ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-default-gems-0:3.0.7-165.el9_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-default-gems-0:3.0.7-165.el9_5.noarch"
},
"product_reference": "ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.0.7-165.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.aarch64"
},
"product_reference": "ruby-devel-0:3.0.7-165.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.0.7-165.el9_5.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.i686"
},
"product_reference": "ruby-devel-0:3.0.7-165.el9_5.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.0.7-165.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.ppc64le"
},
"product_reference": "ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.0.7-165.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.s390x"
},
"product_reference": "ruby-devel-0:3.0.7-165.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.0.7-165.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.x86_64"
},
"product_reference": "ruby-devel-0:3.0.7-165.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-doc-0:3.0.7-165.el9_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-doc-0:3.0.7-165.el9_5.noarch"
},
"product_reference": "ruby-doc-0:3.0.7-165.el9_5.noarch",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.0.7-165.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.aarch64"
},
"product_reference": "ruby-libs-0:3.0.7-165.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.0.7-165.el9_5.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.i686"
},
"product_reference": "ruby-libs-0:3.0.7-165.el9_5.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.0.7-165.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.ppc64le"
},
"product_reference": "ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.0.7-165.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.s390x"
},
"product_reference": "ruby-libs-0:3.0.7-165.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.0.7-165.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.x86_64"
},
"product_reference": "ruby-libs-0:3.0.7-165.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64"
},
"product_reference": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686"
},
"product_reference": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le"
},
"product_reference": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x"
},
"product_reference": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64"
},
"product_reference": "ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64"
},
"product_reference": "rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le"
},
"product_reference": "rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x"
},
"product_reference": "rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64"
},
"product_reference": "rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bundler-0:2.2.33-165.el9_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-bundler-0:2.2.33-165.el9_5.noarch"
},
"product_reference": "rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.5.7-165.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.aarch64"
},
"product_reference": "rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.5.7-165.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.ppc64le"
},
"product_reference": "rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.5.7-165.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.s390x"
},
"product_reference": "rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.5.7-165.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.x86_64"
},
"product_reference": "rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-irb-0:1.3.5-165.el9_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-irb-0:1.3.5-165.el9_5.noarch"
},
"product_reference": "rubygem-irb-0:1.3.5-165.el9_5.noarch",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.5.1-165.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.aarch64"
},
"product_reference": "rubygem-json-0:2.5.1-165.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.5.1-165.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.ppc64le"
},
"product_reference": "rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.5.1-165.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.s390x"
},
"product_reference": "rubygem-json-0:2.5.1-165.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.5.1-165.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.x86_64"
},
"product_reference": "rubygem-json-0:2.5.1-165.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64"
},
"product_reference": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686"
},
"product_reference": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le"
},
"product_reference": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x"
},
"product_reference": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64"
},
"product_reference": "rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-minitest-0:5.14.2-165.el9_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-minitest-0:5.14.2-165.el9_5.noarch"
},
"product_reference": "rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-power_assert-0:1.2.1-165.el9_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-power_assert-0:1.2.1-165.el9_5.noarch"
},
"product_reference": "rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:3.3.2-165.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.aarch64"
},
"product_reference": "rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:3.3.2-165.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.ppc64le"
},
"product_reference": "rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:3.3.2-165.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.s390x"
},
"product_reference": "rubygem-psych-0:3.3.2-165.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:3.3.2-165.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.x86_64"
},
"product_reference": "rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64"
},
"product_reference": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686"
},
"product_reference": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le"
},
"product_reference": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x"
},
"product_reference": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64"
},
"product_reference": "rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rake-0:13.0.3-165.el9_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-rake-0:13.0.3-165.el9_5.noarch"
},
"product_reference": "rubygem-rake-0:13.0.3-165.el9_5.noarch",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-0:1.4.0-165.el9_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-rbs-0:1.4.0-165.el9_5.noarch"
},
"product_reference": "rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch"
},
"product_reference": "rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rexml-0:3.2.5-165.el9_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-rexml-0:3.2.5-165.el9_5.noarch"
},
"product_reference": "rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rss-0:0.2.9-165.el9_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-rss-0:0.2.9-165.el9_5.noarch"
},
"product_reference": "rubygem-rss-0:0.2.9-165.el9_5.noarch",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-test-unit-0:3.3.7-165.el9_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-test-unit-0:3.3.7-165.el9_5.noarch"
},
"product_reference": "rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-typeprof-0:0.15.2-165.el9_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygem-typeprof-0:0.15.2-165.el9_5.noarch"
},
"product_reference": "rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygems-0:3.2.33-165.el9_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygems-0:3.2.33-165.el9_5.noarch"
},
"product_reference": "rubygems-0:3.2.33-165.el9_5.noarch",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygems-devel-0:3.2.33-165.el9_5.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.5.0.Z.MAIN:rubygems-devel-0:3.2.33-165.el9_5.noarch"
},
"product_reference": "rubygems-devel-0:3.2.33-165.el9_5.noarch",
"relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-27219",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-03-04T00:00:47.344814+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2349699"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby\u0027s CGI gem. Processing specially crafted large cookies with the CGI::Cookie.parse method can cause excessive resource consumption due to a missing limit on the length of the raw cookie value, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "CGI: Denial of Service in CGI::Cookie.parse",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue will cause an excessive resource consumption, potentially resulting in a bad application performance. However, an attacker does have the ability to completely deny service to legitimate users. For this reason, this vulnerability has been rated with a moderate severity.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-770: Allocation of Resources Without Limits or Throttling vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings required for operations, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that detect excessive resource usage caused by malicious activity or system misconfigurations. In the event of exploitation, process isolation ensures workloads operate in separate environments, preventing any single process from overconsuming CPU or memory and degrading system performance.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.src",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.0.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.3.5-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.3-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.2.9-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.2.33-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.src",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-doc-0:3.0.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-irb-0:1.3.5-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-rake-0:13.0.3-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rss-0:0.2.9-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygems-0:3.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygems-devel-0:3.2.33-165.el9_5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-27219"
},
{
"category": "external",
"summary": "RHBZ#2349699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349699"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-27219",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27219"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2025/02/26/security-advisories/",
"url": "https://www.ruby-lang.org/en/news/2025/02/26/security-advisories/"
}
],
"release_date": "2025-03-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-06T02:20:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.src",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.0.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.3.5-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.3-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.2.9-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.2.33-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.src",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-doc-0:3.0.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-irb-0:1.3.5-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-rake-0:13.0.3-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rss-0:0.2.9-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygems-0:3.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygems-devel-0:3.2.33-165.el9_5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4487"
},
{
"category": "workaround",
"details": "Do not process large cookies or strings with the CGI::Cookie.parse method from the CGI library. Adding a check to verify and limit the length of the cookie or string before processing it will mitigate this vulnerability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.src",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.0.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.3.5-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.3-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.2.9-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.2.33-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.src",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-doc-0:3.0.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-irb-0:1.3.5-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-rake-0:13.0.3-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rss-0:0.2.9-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygems-0:3.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygems-devel-0:3.2.33-165.el9_5.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.src",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.0.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.3.5-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.3-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.2.9-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.2.33-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.src",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-doc-0:3.0.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-irb-0:1.3.5-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-rake-0:13.0.3-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rss-0:0.2.9-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygems-0:3.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygems-devel-0:3.2.33-165.el9_5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "CGI: Denial of Service in CGI::Cookie.parse"
},
{
"cve": "CVE-2025-27220",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2025-03-04T00:00:40.772427+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2349696"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby\u0027s CGI gem. The CGI::Util#escapeElement method is vulnerable to Regular expression Denial of Service (ReDoS), allowing a specially crafted input to cause a high CPU consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "CGI: ReDoS in CGI::Util#escapeElement",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue will cause an excessive resource consumption, potentially resulting in a degraded application performance. However, an attacker does have the ability to completely deny service to legitimate users. As such, Red hat has rated the CVSS Availability as LOW instead of HIGH.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.src",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.0.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.3.5-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.3-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.2.9-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.2.33-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.src",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-doc-0:3.0.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-irb-0:1.3.5-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-rake-0:13.0.3-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rss-0:0.2.9-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygems-0:3.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygems-devel-0:3.2.33-165.el9_5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-27220"
},
{
"category": "external",
"summary": "RHBZ#2349696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349696"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-27220",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27220"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2025/02/26/security-advisories/",
"url": "https://www.ruby-lang.org/en/news/2025/02/26/security-advisories/"
}
],
"release_date": "2025-03-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-06T02:20:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.src",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.0.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.3.5-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.3-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.2.9-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.2.33-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.src",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-doc-0:3.0.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-irb-0:1.3.5-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-rake-0:13.0.3-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rss-0:0.2.9-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygems-0:3.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygems-devel-0:3.2.33-165.el9_5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4487"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.src",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.0.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.3.5-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.3-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.2.9-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.2.33-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.src",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-doc-0:3.0.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-irb-0:1.3.5-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-rake-0:13.0.3-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rss-0:0.2.9-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygems-0:3.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygems-devel-0:3.2.33-165.el9_5.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.src",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.0.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.3.5-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.3-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.2.9-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.2.33-165.el9_5.noarch",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.src",
"CRB-9.5.0.Z.MAIN:ruby-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-debuginfo-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-debugsource-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-default-gems-0:3.0.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-devel-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-doc-0:3.0.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-libs-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.0.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.0.0-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.0.0-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-bundler-0:2.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.7-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-irb-0:1.3.5-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-json-0:2.5.1-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.5.1-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-minitest-0:5.14.2-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-power_assert-0:1.2.1-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-psych-0:3.3.2-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.aarch64",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.i686",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.ppc64le",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.s390x",
"CRB-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:3.3.2-165.el9_5.x86_64",
"CRB-9.5.0.Z.MAIN:rubygem-rake-0:13.0.3-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rbs-0:1.4.0-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rdoc-0:6.3.4.1-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rexml-0:3.2.5-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-rss-0:0.2.9-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-test-unit-0:3.3.7-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygem-typeprof-0:0.15.2-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygems-0:3.2.33-165.el9_5.noarch",
"CRB-9.5.0.Z.MAIN:rubygems-devel-0:3.2.33-165.el9_5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "CGI: ReDoS in CGI::Util#escapeElement"
}
]
}
RHSA-2025:4063
Vulnerability from csaf_redhat - Published: 2025-04-23 10:34 - Updated: 2025-11-21 19:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the ruby:3.1 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.\n\nSecurity Fix(es):\n\n* rexml: DoS vulnerability in REXML (CVE-2024-39908)\n\n* rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, \u003e] and ]\u003e (CVE-2024-41123)\n\n* rexml: DoS vulnerability in REXML (CVE-2024-41946)\n\n* rexml: DoS vulnerability in REXML (CVE-2024-43398)\n\n* CGI: ReDoS in CGI::Util#escapeElement (CVE-2025-27220)\n\n* CGI: Denial of Service in CGI::Cookie.parse (CVE-2025-27219)\n\n* uri: userinfo leakage in URI#join, URI#merge and URI#+ (CVE-2025-27221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:4063",
"url": "https://access.redhat.com/errata/RHSA-2025:4063"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2298243",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298243"
},
{
"category": "external",
"summary": "2302268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302268"
},
{
"category": "external",
"summary": "2302272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302272"
},
{
"category": "external",
"summary": "2307297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2307297"
},
{
"category": "external",
"summary": "2349696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349696"
},
{
"category": "external",
"summary": "2349699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349699"
},
{
"category": "external",
"summary": "2349700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349700"
},
{
"category": "external",
"summary": "RHEL-55408",
"url": "https://issues.redhat.com/browse/RHEL-55408"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_4063.json"
}
],
"title": "Red Hat Security Advisory: ruby:3.1 security update",
"tracking": {
"current_release_date": "2025-11-21T19:34:10+00:00",
"generator": {
"date": "2025-11-21T19:34:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:4063",
"initial_release_date": "2025-04-23T10:34:54+00:00",
"revision_history": [
{
"date": "2025-04-23T10:34:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-04-23T10:34:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:34:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product": {
"name": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1)",
"product_id": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=i686\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1)",
"product_id": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=i686\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1)",
"product_id": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems-debuginfo@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=i686\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product": {
"name": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1)",
"product_id": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=i686\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product": {
"name": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1)",
"product_id": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=i686\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product": {
"name": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1)",
"product_id": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=i686\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product": {
"name": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1)",
"product_id": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=i686\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product": {
"name": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1)",
"product_id": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=i686\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1)",
"product_id": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal@3.1.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=i686\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1)",
"product_id": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@3.1.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=i686\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product": {
"name": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1)",
"product_id": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console@0.5.11-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=i686\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1)",
"product_id": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.5.11-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=i686\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product": {
"name": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1)",
"product_id": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json@2.6.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=i686\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product": {
"name": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1)",
"product_id": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.6.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=i686\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product": {
"name": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1)",
"product_id": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych@4.0.4-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=i686\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product": {
"name": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1)",
"product_id": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@4.0.4-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=i686\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product": {
"name": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1)",
"product_id": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs@2.7.0-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=i686\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1)",
"product_id": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs-debuginfo@2.7.0-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=i686\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"product": {
"name": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src (ruby:3.1)",
"product_id": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=src\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"product": {
"name": "rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src (ruby:3.1)",
"product_id": "rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-abrt@0.4.0-1.module%2Bel8.10.0%2B21470%2B43ec8058?arch=src\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"product": {
"name": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src (ruby:3.1)",
"product_id": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2@0.5.3-3.module%2Bel8.10.0%2B21470%2B43ec8058?arch=src\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"product": {
"name": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src (ruby:3.1)",
"product_id": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg@1.3.2-1.module%2Bel8.10.0%2B21470%2B43ec8058?arch=src\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product": {
"name": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1)",
"product_id": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1)",
"product_id": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1)",
"product_id": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems-debuginfo@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product": {
"name": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1)",
"product_id": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product": {
"name": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1)",
"product_id": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product": {
"name": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1)",
"product_id": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product": {
"name": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1)",
"product_id": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product": {
"name": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1)",
"product_id": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1)",
"product_id": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal@3.1.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1)",
"product_id": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@3.1.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product": {
"name": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1)",
"product_id": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console@0.5.11-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1)",
"product_id": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.5.11-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product": {
"name": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1)",
"product_id": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json@2.6.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product": {
"name": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1)",
"product_id": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.6.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"product": {
"name": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64 (ruby:3.1)",
"product_id": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2@0.5.3-3.module%2Bel8.10.0%2B21470%2B43ec8058?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"product": {
"name": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64 (ruby:3.1)",
"product_id": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debuginfo@0.5.3-3.module%2Bel8.10.0%2B21470%2B43ec8058?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"product": {
"name": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64 (ruby:3.1)",
"product_id": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debugsource@0.5.3-3.module%2Bel8.10.0%2B21470%2B43ec8058?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"product": {
"name": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64 (ruby:3.1)",
"product_id": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg@1.3.2-1.module%2Bel8.10.0%2B21470%2B43ec8058?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"product": {
"name": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64 (ruby:3.1)",
"product_id": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debuginfo@1.3.2-1.module%2Bel8.10.0%2B21470%2B43ec8058?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"product": {
"name": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64 (ruby:3.1)",
"product_id": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debugsource@1.3.2-1.module%2Bel8.10.0%2B21470%2B43ec8058?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product": {
"name": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1)",
"product_id": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych@4.0.4-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product": {
"name": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1)",
"product_id": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@4.0.4-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product": {
"name": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1)",
"product_id": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs@2.7.0-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1)",
"product_id": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs-debuginfo@2.7.0-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=x86_64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product": {
"name": "ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1)",
"product_id": "ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-default-gems@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=noarch\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product": {
"name": "ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1)",
"product_id": "ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-doc@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=noarch\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"product": {
"name": "rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch (ruby:3.1)",
"product_id": "rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-abrt@0.4.0-1.module%2Bel8.10.0%2B21470%2B43ec8058?arch=noarch\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"product": {
"name": "rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch (ruby:3.1)",
"product_id": "rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-abrt-doc@0.4.0-1.module%2Bel8.10.0%2B21470%2B43ec8058?arch=noarch\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product": {
"name": "rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1)",
"product_id": "rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bundler@2.3.27-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=noarch\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product": {
"name": "rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1)",
"product_id": "rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-irb@1.4.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=noarch\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product": {
"name": "rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1)",
"product_id": "rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-minitest@5.15.0-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=noarch\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"product": {
"name": "rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch (ruby:3.1)",
"product_id": "rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-doc@0.5.3-3.module%2Bel8.10.0%2B21470%2B43ec8058?arch=noarch\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"product": {
"name": "rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch (ruby:3.1)",
"product_id": "rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-doc@1.3.2-1.module%2Bel8.10.0%2B21470%2B43ec8058?arch=noarch\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product": {
"name": "rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1)",
"product_id": "rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-power_assert@2.0.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=noarch\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product": {
"name": "rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1)",
"product_id": "rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rake@13.0.6-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=noarch\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product": {
"name": "rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1)",
"product_id": "rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rdoc@6.4.1.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=noarch\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product": {
"name": "rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1)",
"product_id": "rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rexml@3.3.9-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=noarch\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product": {
"name": "rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1)",
"product_id": "rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rss@0.3.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=noarch\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product": {
"name": "rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1)",
"product_id": "rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-test-unit@3.5.3-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=noarch\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product": {
"name": "rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1)",
"product_id": "rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-typeprof@0.21.3-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=noarch\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product": {
"name": "rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1)",
"product_id": "rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygems@3.3.27-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=noarch\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product": {
"name": "rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1)",
"product_id": "rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygems-devel@3.3.27-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=noarch\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product": {
"name": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1)",
"product_id": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1)",
"product_id": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1)",
"product_id": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems-debuginfo@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product": {
"name": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1)",
"product_id": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product": {
"name": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1)",
"product_id": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product": {
"name": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1)",
"product_id": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product": {
"name": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1)",
"product_id": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product": {
"name": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1)",
"product_id": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1)",
"product_id": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal@3.1.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1)",
"product_id": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@3.1.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product": {
"name": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1)",
"product_id": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console@0.5.11-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1)",
"product_id": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.5.11-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product": {
"name": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1)",
"product_id": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json@2.6.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product": {
"name": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1)",
"product_id": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.6.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"product": {
"name": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64 (ruby:3.1)",
"product_id": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2@0.5.3-3.module%2Bel8.10.0%2B21470%2B43ec8058?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"product": {
"name": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64 (ruby:3.1)",
"product_id": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debuginfo@0.5.3-3.module%2Bel8.10.0%2B21470%2B43ec8058?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"product": {
"name": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64 (ruby:3.1)",
"product_id": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debugsource@0.5.3-3.module%2Bel8.10.0%2B21470%2B43ec8058?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"product": {
"name": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64 (ruby:3.1)",
"product_id": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg@1.3.2-1.module%2Bel8.10.0%2B21470%2B43ec8058?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"product": {
"name": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64 (ruby:3.1)",
"product_id": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debuginfo@1.3.2-1.module%2Bel8.10.0%2B21470%2B43ec8058?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"product": {
"name": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64 (ruby:3.1)",
"product_id": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debugsource@1.3.2-1.module%2Bel8.10.0%2B21470%2B43ec8058?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product": {
"name": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1)",
"product_id": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych@4.0.4-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product": {
"name": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1)",
"product_id": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@4.0.4-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product": {
"name": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1)",
"product_id": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs@2.7.0-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1)",
"product_id": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs-debuginfo@2.7.0-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=aarch64\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product": {
"name": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1)",
"product_id": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1)",
"product_id": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1)",
"product_id": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems-debuginfo@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product": {
"name": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1)",
"product_id": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product": {
"name": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1)",
"product_id": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product": {
"name": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1)",
"product_id": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product": {
"name": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1)",
"product_id": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product": {
"name": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1)",
"product_id": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1)",
"product_id": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal@3.1.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1)",
"product_id": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@3.1.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1)",
"product_id": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console@0.5.11-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1)",
"product_id": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.5.11-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1)",
"product_id": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json@2.6.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1)",
"product_id": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.6.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le (ruby:3.1)",
"product_id": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2@0.5.3-3.module%2Bel8.10.0%2B21470%2B43ec8058?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le (ruby:3.1)",
"product_id": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debuginfo@0.5.3-3.module%2Bel8.10.0%2B21470%2B43ec8058?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le (ruby:3.1)",
"product_id": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debugsource@0.5.3-3.module%2Bel8.10.0%2B21470%2B43ec8058?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le (ruby:3.1)",
"product_id": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg@1.3.2-1.module%2Bel8.10.0%2B21470%2B43ec8058?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le (ruby:3.1)",
"product_id": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debuginfo@1.3.2-1.module%2Bel8.10.0%2B21470%2B43ec8058?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le (ruby:3.1)",
"product_id": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debugsource@1.3.2-1.module%2Bel8.10.0%2B21470%2B43ec8058?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1)",
"product_id": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych@4.0.4-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1)",
"product_id": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@4.0.4-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1)",
"product_id": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs@2.7.0-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1)",
"product_id": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs-debuginfo@2.7.0-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=ppc64le\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product": {
"name": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1)",
"product_id": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1)",
"product_id": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1)",
"product_id": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems-debuginfo@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product": {
"name": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1)",
"product_id": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product": {
"name": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1)",
"product_id": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product": {
"name": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1)",
"product_id": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product": {
"name": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1)",
"product_id": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product": {
"name": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1)",
"product_id": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@3.1.7-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1)",
"product_id": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal@3.1.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1)",
"product_id": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@3.1.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product": {
"name": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1)",
"product_id": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console@0.5.11-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1)",
"product_id": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.5.11-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product": {
"name": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1)",
"product_id": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json@2.6.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product": {
"name": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1)",
"product_id": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.6.1-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"product": {
"name": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x (ruby:3.1)",
"product_id": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2@0.5.3-3.module%2Bel8.10.0%2B21470%2B43ec8058?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"product": {
"name": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x (ruby:3.1)",
"product_id": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debuginfo@0.5.3-3.module%2Bel8.10.0%2B21470%2B43ec8058?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"product": {
"name": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x (ruby:3.1)",
"product_id": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debugsource@0.5.3-3.module%2Bel8.10.0%2B21470%2B43ec8058?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"product": {
"name": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x (ruby:3.1)",
"product_id": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg@1.3.2-1.module%2Bel8.10.0%2B21470%2B43ec8058?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"product": {
"name": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x (ruby:3.1)",
"product_id": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debuginfo@1.3.2-1.module%2Bel8.10.0%2B21470%2B43ec8058?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"product": {
"name": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x (ruby:3.1)",
"product_id": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debugsource@1.3.2-1.module%2Bel8.10.0%2B21470%2B43ec8058?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product": {
"name": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1)",
"product_id": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych@4.0.4-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product": {
"name": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1)",
"product_id": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@4.0.4-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product": {
"name": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1)",
"product_id": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs@2.7.0-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1)",
"product_id": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs-debuginfo@2.7.0-145.module%2Bel8.10.0%2B23011%2Bf9d508f8?arch=s390x\u0026rpmmod=ruby:3.1:8100020250407112943:489197e6"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1"
},
"product_reference": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1"
},
"product_reference": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1"
},
"product_reference": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1"
},
"product_reference": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1"
},
"product_reference": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1"
},
"product_reference": "ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1"
},
"product_reference": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1"
},
"product_reference": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1"
},
"product_reference": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1"
},
"product_reference": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1"
},
"product_reference": "ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1"
},
"product_reference": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1"
},
"product_reference": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1"
},
"product_reference": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1"
},
"product_reference": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1"
},
"product_reference": "ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
},
"product_reference": "ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1"
},
"product_reference": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1"
},
"product_reference": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1"
},
"product_reference": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1"
},
"product_reference": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1"
},
"product_reference": "ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
},
"product_reference": "ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1"
},
"product_reference": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1"
},
"product_reference": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1"
},
"product_reference": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1"
},
"product_reference": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1"
},
"product_reference": "ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1"
},
"product_reference": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1"
},
"product_reference": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1"
},
"product_reference": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1"
},
"product_reference": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1"
},
"product_reference": "ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1"
},
"product_reference": "rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1"
},
"product_reference": "rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1"
},
"product_reference": "rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
},
"product_reference": "rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1"
},
"product_reference": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1"
},
"product_reference": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1"
},
"product_reference": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1"
},
"product_reference": "rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
},
"product_reference": "rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1"
},
"product_reference": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1"
},
"product_reference": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1"
},
"product_reference": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1"
},
"product_reference": "rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1"
},
"product_reference": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1"
},
"product_reference": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1"
},
"product_reference": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1"
},
"product_reference": "rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
},
"product_reference": "rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1"
},
"product_reference": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1"
},
"product_reference": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1"
},
"product_reference": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1"
},
"product_reference": "rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1"
},
"product_reference": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1"
},
"product_reference": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1"
},
"product_reference": "rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1"
},
"product_reference": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1"
},
"product_reference": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1"
},
"product_reference": "rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1"
},
"product_reference": "rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1"
},
"product_reference": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1"
},
"product_reference": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1"
},
"product_reference": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1"
},
"product_reference": "rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1"
},
"product_reference": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1"
},
"product_reference": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1"
},
"product_reference": "rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1"
},
"product_reference": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1"
},
"product_reference": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1"
},
"product_reference": "rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1"
},
"product_reference": "rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
},
"product_reference": "rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1"
},
"product_reference": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1"
},
"product_reference": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1"
},
"product_reference": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1"
},
"product_reference": "rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1"
},
"product_reference": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1"
},
"product_reference": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1"
},
"product_reference": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1"
},
"product_reference": "rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
},
"product_reference": "rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1"
},
"product_reference": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1"
},
"product_reference": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1"
},
"product_reference": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1"
},
"product_reference": "rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1"
},
"product_reference": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1"
},
"product_reference": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1"
},
"product_reference": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1"
},
"product_reference": "rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
},
"product_reference": "rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
},
"product_reference": "rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
},
"product_reference": "rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
},
"product_reference": "rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
},
"product_reference": "rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
},
"product_reference": "rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
},
"product_reference": "rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-39908",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-07-16T18:32:33+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2298243"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption vulnerability was found in REXML. When parsing an untrusted XML with many specific characters such as `\u003c`, `0`, and `%\u003e`, it can lead to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rexml: DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-39908"
},
{
"category": "external",
"summary": "RHBZ#2298243",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298243"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39908",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39908"
},
{
"category": "external",
"summary": "https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8",
"url": "https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2024/07/16/dos-rexml-cve-2024-39908",
"url": "https://www.ruby-lang.org/en/news/2024/07/16/dos-rexml-cve-2024-39908"
}
],
"release_date": "2024-07-16T06:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-23T10:34:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4063"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rexml: DoS vulnerability in REXML"
},
{
"cve": "CVE-2024-41123",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-08-01T15:30:28+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302268"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in REXML, an XML toolkit used for Ruby. When parsing an untrusted XML with many specific characters, the REXML gem may take a long time, leading to a denial of service condition. Some of these special characters include the whitespace character, \u0027\u003e]\u0027, and \u0027]\u003e\u0027.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, \u003e] and ]\u003e",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat believes this flaw to be moderate because a potential denial of service condition would create minimal impact at the application level and not the entire system.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41123"
},
{
"category": "external",
"summary": "RHBZ#2302268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302268"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41123",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41123"
},
{
"category": "external",
"summary": "https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8",
"url": "https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8"
},
{
"category": "external",
"summary": "https://github.com/ruby/rexml/security/advisories/GHSA-r55c-59qm-vjw6",
"url": "https://github.com/ruby/rexml/security/advisories/GHSA-r55c-59qm-vjw6"
},
{
"category": "external",
"summary": "https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh",
"url": "https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123",
"url": "https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123"
}
],
"release_date": "2024-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-23T10:34:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4063"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability. It is recommended to upgrade the REXML gem to fix these vulnerabilities.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, \u003e] and ]\u003e"
},
{
"cve": "CVE-2024-41946",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-08-01T15:30:43+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the REXML package. Reading an XML file that contains many entity expansions may lead to a denial of service due to resource starvation. An attacker can use this flaw to trick a user into processing an untrusted XML file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rexml: DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41946"
},
{
"category": "external",
"summary": "RHBZ#2302272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41946",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41946"
},
{
"category": "external",
"summary": "https://github.com/ruby/rexml/commit/033d1909a8f259d5a7c53681bcaf14f13bcf0368",
"url": "https://github.com/ruby/rexml/commit/033d1909a8f259d5a7c53681bcaf14f13bcf0368"
},
{
"category": "external",
"summary": "https://github.com/ruby/rexml/security/advisories/GHSA-5866-49gr-22v4",
"url": "https://github.com/ruby/rexml/security/advisories/GHSA-5866-49gr-22v4"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml",
"url": "https://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946",
"url": "https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946"
}
],
"release_date": "2024-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-23T10:34:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4063"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rexml: DoS vulnerability in REXML"
},
{
"cve": "CVE-2024-43398",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2024-08-22T15:21:20.836180+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2307297"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in REXML RubyGems. This package is vulnerable to denial of service (DoS) when parsing a deep XML structure with the same local name attribute. This vulnerability only affects tree parser API like REXML::Document.new, other parser APIs such as stream parser API and SAX2 parser API are not affected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rexml: DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-43398"
},
{
"category": "external",
"summary": "RHBZ#2307297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2307297"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-43398",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-43398"
},
{
"category": "external",
"summary": "https://github.com/ruby/rexml/releases/tag/v3.3.6",
"url": "https://github.com/ruby/rexml/releases/tag/v3.3.6"
},
{
"category": "external",
"summary": "https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3",
"url": "https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3"
}
],
"release_date": "2024-08-22T15:15:16.440000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-23T10:34:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4063"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rexml: DoS vulnerability in REXML"
},
{
"cve": "CVE-2025-27219",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-03-04T00:00:47.344814+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2349699"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby\u0027s CGI gem. Processing specially crafted large cookies with the CGI::Cookie.parse method can cause excessive resource consumption due to a missing limit on the length of the raw cookie value, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "CGI: Denial of Service in CGI::Cookie.parse",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue will cause an excessive resource consumption, potentially resulting in a bad application performance. However, an attacker does have the ability to completely deny service to legitimate users. For this reason, this vulnerability has been rated with a moderate severity.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-770: Allocation of Resources Without Limits or Throttling vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings required for operations, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that detect excessive resource usage caused by malicious activity or system misconfigurations. In the event of exploitation, process isolation ensures workloads operate in separate environments, preventing any single process from overconsuming CPU or memory and degrading system performance.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-27219"
},
{
"category": "external",
"summary": "RHBZ#2349699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349699"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-27219",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27219"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2025/02/26/security-advisories/",
"url": "https://www.ruby-lang.org/en/news/2025/02/26/security-advisories/"
}
],
"release_date": "2025-03-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-23T10:34:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4063"
},
{
"category": "workaround",
"details": "Do not process large cookies or strings with the CGI::Cookie.parse method from the CGI library. Adding a check to verify and limit the length of the cookie or string before processing it will mitigate this vulnerability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "CGI: Denial of Service in CGI::Cookie.parse"
},
{
"cve": "CVE-2025-27220",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2025-03-04T00:00:40.772427+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2349696"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby\u0027s CGI gem. The CGI::Util#escapeElement method is vulnerable to Regular expression Denial of Service (ReDoS), allowing a specially crafted input to cause a high CPU consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "CGI: ReDoS in CGI::Util#escapeElement",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue will cause an excessive resource consumption, potentially resulting in a degraded application performance. However, an attacker does have the ability to completely deny service to legitimate users. As such, Red hat has rated the CVSS Availability as LOW instead of HIGH.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-27220"
},
{
"category": "external",
"summary": "RHBZ#2349696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349696"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-27220",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27220"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2025/02/26/security-advisories/",
"url": "https://www.ruby-lang.org/en/news/2025/02/26/security-advisories/"
}
],
"release_date": "2025-03-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-23T10:34:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4063"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "CGI: ReDoS in CGI::Util#escapeElement"
},
{
"cve": "CVE-2025-27221",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2025-03-04T00:00:49.400177+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2349700"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the URI ruby gem package, where userinfo leakage can occur in the uri gem. The methods URI#join, URI#merge, and URI#+ retained userinfo, such as user:password, even after the host is replaced. When generating a URL to a malicious host from a URL containing secret userinfo using these methods, and having someone access that URL, an unintended userinfo leak can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "uri: userinfo leakage in URI#join, URI#merge and URI#+",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-27221"
},
{
"category": "external",
"summary": "RHBZ#2349700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-27221",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27221"
},
{
"category": "external",
"summary": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/uri/CVE-2025-27221.yml",
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/uri/CVE-2025-27221.yml"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/2957667",
"url": "https://hackerone.com/reports/2957667"
}
],
"release_date": "2025-03-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-23T10:34:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4063"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.2,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-bundled-gems-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-debugsource-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-default-gems-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-devel-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-doc-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:ruby-libs-debuginfo-0:3.1.7-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-0:0.4.0-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-abrt-doc-0:0.4.0-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bigdecimal-debuginfo-0:3.1.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-bundler-0:2.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-io-console-debuginfo-0:0.5.11-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-irb-0:1.4.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-json-debuginfo-0:2.6.1-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-minitest-0:5.15.0-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debuginfo-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-debugsource-0:0.5.3-3.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-mysql2-doc-0:0.5.3-3.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.src::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debuginfo-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-debugsource-0:1.3.2-1.module+el8.10.0+21470+43ec8058.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-pg-doc-0:1.3.2-1.module+el8.10.0+21470+43ec8058.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-power_assert-0:2.0.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-psych-debuginfo-0:4.0.4-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rake-0:13.0.6-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.aarch64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.i686::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.ppc64le::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.s390x::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rbs-debuginfo-0:2.7.0-145.module+el8.10.0+23011+f9d508f8.x86_64::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rdoc-0:6.4.1.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rexml-0:3.3.9-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-rss-0:0.3.1-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-test-unit-0:3.5.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygem-typeprof-0:0.21.3-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1",
"AppStream-8.10.0.Z.MAIN.EUS:rubygems-devel-0:3.3.27-145.module+el8.10.0+23011+f9d508f8.noarch::ruby:3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "uri: userinfo leakage in URI#join, URI#merge and URI#+"
}
]
}
RHSA-2025:4488
Vulnerability from csaf_redhat - Published: 2025-05-06 02:33 - Updated: 2025-11-21 19:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the ruby:3.1 module is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.\n\nSecurity Fix(es):\n\n* rexml: DoS vulnerability in REXML (CVE-2024-39908)\n\n* rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, \u003e] and ]\u003e (CVE-2024-41123)\n\n* rexml: DoS vulnerability in REXML (CVE-2024-41946)\n\n* rexml: DoS vulnerability in REXML (CVE-2024-43398)\n\n* CGI: ReDoS in CGI::Util#escapeElement (CVE-2025-27220)\n\n* CGI: Denial of Service in CGI::Cookie.parse (CVE-2025-27219)\n\n* uri: userinfo leakage in URI#join, URI#merge and URI#+ (CVE-2025-27221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:4488",
"url": "https://access.redhat.com/errata/RHSA-2025:4488"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2298243",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298243"
},
{
"category": "external",
"summary": "2302268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302268"
},
{
"category": "external",
"summary": "2302272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302272"
},
{
"category": "external",
"summary": "2307297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2307297"
},
{
"category": "external",
"summary": "2349696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349696"
},
{
"category": "external",
"summary": "2349699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349699"
},
{
"category": "external",
"summary": "2349700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349700"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_4488.json"
}
],
"title": "Red Hat Security Advisory: ruby:3.1 security update",
"tracking": {
"current_release_date": "2025-11-21T19:34:33+00:00",
"generator": {
"date": "2025-11-21T19:34:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:4488",
"initial_release_date": "2025-05-06T02:33:06+00:00",
"revision_history": [
{
"date": "2025-05-06T02:33:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-05-06T02:33:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:34:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product": {
"name": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1)",
"product_id": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=i686\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1)",
"product_id": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=i686\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1)",
"product_id": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems-debuginfo@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=i686\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product": {
"name": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1)",
"product_id": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=i686\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product": {
"name": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1)",
"product_id": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=i686\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product": {
"name": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1)",
"product_id": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=i686\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product": {
"name": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1)",
"product_id": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=i686\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product": {
"name": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1)",
"product_id": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=i686\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1)",
"product_id": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal@3.1.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=i686\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1)",
"product_id": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@3.1.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=i686\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product": {
"name": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1)",
"product_id": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console@0.5.11-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=i686\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1)",
"product_id": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.5.11-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=i686\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product": {
"name": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1)",
"product_id": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json@2.6.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=i686\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product": {
"name": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1)",
"product_id": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.6.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=i686\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product": {
"name": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1)",
"product_id": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych@4.0.4-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=i686\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product": {
"name": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1)",
"product_id": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@4.0.4-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=i686\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product": {
"name": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1)",
"product_id": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs@2.7.0-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=i686\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1)",
"product_id": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs-debuginfo@2.7.0-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=i686\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"product": {
"name": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src (ruby:3.1)",
"product_id": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=src\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"product": {
"name": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src (ruby:3.1)",
"product_id": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2@0.5.4-1.module%2Bel9.1.0%2B15737%2B76195479?arch=src\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"product": {
"name": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src (ruby:3.1)",
"product_id": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg@1.3.5-1.module%2Bel9.1.0%2B15737%2B76195479?arch=src\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product": {
"name": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1)",
"product_id": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1)",
"product_id": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1)",
"product_id": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems-debuginfo@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product": {
"name": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1)",
"product_id": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product": {
"name": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1)",
"product_id": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product": {
"name": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1)",
"product_id": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product": {
"name": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1)",
"product_id": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product": {
"name": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1)",
"product_id": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1)",
"product_id": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal@3.1.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1)",
"product_id": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@3.1.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product": {
"name": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1)",
"product_id": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console@0.5.11-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1)",
"product_id": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.5.11-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product": {
"name": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1)",
"product_id": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json@2.6.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product": {
"name": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1)",
"product_id": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.6.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"product": {
"name": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64 (ruby:3.1)",
"product_id": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2@0.5.4-1.module%2Bel9.1.0%2B15737%2B76195479?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"product": {
"name": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64 (ruby:3.1)",
"product_id": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debuginfo@0.5.4-1.module%2Bel9.1.0%2B15737%2B76195479?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"product": {
"name": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64 (ruby:3.1)",
"product_id": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debugsource@0.5.4-1.module%2Bel9.1.0%2B15737%2B76195479?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"product": {
"name": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64 (ruby:3.1)",
"product_id": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg@1.3.5-1.module%2Bel9.1.0%2B15737%2B76195479?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"product": {
"name": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64 (ruby:3.1)",
"product_id": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debuginfo@1.3.5-1.module%2Bel9.1.0%2B15737%2B76195479?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"product": {
"name": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64 (ruby:3.1)",
"product_id": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debugsource@1.3.5-1.module%2Bel9.1.0%2B15737%2B76195479?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product": {
"name": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1)",
"product_id": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych@4.0.4-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product": {
"name": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1)",
"product_id": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@4.0.4-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product": {
"name": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1)",
"product_id": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs@2.7.0-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1)",
"product_id": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs-debuginfo@2.7.0-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=x86_64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product": {
"name": "ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1)",
"product_id": "ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-default-gems@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=noarch\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product": {
"name": "ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1)",
"product_id": "ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-doc@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=noarch\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product": {
"name": "rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1)",
"product_id": "rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bundler@2.3.27-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=noarch\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product": {
"name": "rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1)",
"product_id": "rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-irb@1.4.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=noarch\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product": {
"name": "rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1)",
"product_id": "rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-minitest@5.15.0-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=noarch\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"product": {
"name": "rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch (ruby:3.1)",
"product_id": "rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-doc@0.5.4-1.module%2Bel9.1.0%2B15737%2B76195479?arch=noarch\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"product": {
"name": "rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch (ruby:3.1)",
"product_id": "rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-doc@1.3.5-1.module%2Bel9.1.0%2B15737%2B76195479?arch=noarch\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product": {
"name": "rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1)",
"product_id": "rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-power_assert@2.0.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=noarch\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product": {
"name": "rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1)",
"product_id": "rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rake@13.0.6-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=noarch\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product": {
"name": "rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1)",
"product_id": "rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rdoc@6.4.1.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=noarch\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product": {
"name": "rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1)",
"product_id": "rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rexml@3.3.9-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=noarch\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product": {
"name": "rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1)",
"product_id": "rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rss@0.3.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=noarch\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product": {
"name": "rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1)",
"product_id": "rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-test-unit@3.5.3-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=noarch\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product": {
"name": "rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1)",
"product_id": "rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-typeprof@0.21.3-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=noarch\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product": {
"name": "rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1)",
"product_id": "rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygems@3.3.27-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=noarch\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product": {
"name": "rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1)",
"product_id": "rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygems-devel@3.3.27-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=noarch\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product": {
"name": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1)",
"product_id": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1)",
"product_id": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1)",
"product_id": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems-debuginfo@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product": {
"name": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1)",
"product_id": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product": {
"name": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1)",
"product_id": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product": {
"name": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1)",
"product_id": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product": {
"name": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1)",
"product_id": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product": {
"name": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1)",
"product_id": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1)",
"product_id": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal@3.1.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1)",
"product_id": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@3.1.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product": {
"name": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1)",
"product_id": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console@0.5.11-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1)",
"product_id": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.5.11-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product": {
"name": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1)",
"product_id": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json@2.6.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product": {
"name": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1)",
"product_id": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.6.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"product": {
"name": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64 (ruby:3.1)",
"product_id": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2@0.5.4-1.module%2Bel9.1.0%2B15737%2B76195479?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"product": {
"name": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64 (ruby:3.1)",
"product_id": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debuginfo@0.5.4-1.module%2Bel9.1.0%2B15737%2B76195479?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"product": {
"name": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64 (ruby:3.1)",
"product_id": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debugsource@0.5.4-1.module%2Bel9.1.0%2B15737%2B76195479?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"product": {
"name": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64 (ruby:3.1)",
"product_id": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg@1.3.5-1.module%2Bel9.1.0%2B15737%2B76195479?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"product": {
"name": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64 (ruby:3.1)",
"product_id": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debuginfo@1.3.5-1.module%2Bel9.1.0%2B15737%2B76195479?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"product": {
"name": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64 (ruby:3.1)",
"product_id": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debugsource@1.3.5-1.module%2Bel9.1.0%2B15737%2B76195479?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product": {
"name": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1)",
"product_id": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych@4.0.4-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product": {
"name": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1)",
"product_id": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@4.0.4-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product": {
"name": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1)",
"product_id": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs@2.7.0-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1)",
"product_id": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs-debuginfo@2.7.0-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=aarch64\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product": {
"name": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1)",
"product_id": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1)",
"product_id": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1)",
"product_id": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems-debuginfo@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product": {
"name": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1)",
"product_id": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product": {
"name": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1)",
"product_id": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product": {
"name": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1)",
"product_id": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product": {
"name": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1)",
"product_id": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product": {
"name": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1)",
"product_id": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1)",
"product_id": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal@3.1.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1)",
"product_id": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@3.1.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1)",
"product_id": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console@0.5.11-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1)",
"product_id": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.5.11-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1)",
"product_id": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json@2.6.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1)",
"product_id": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.6.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le (ruby:3.1)",
"product_id": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2@0.5.4-1.module%2Bel9.1.0%2B15737%2B76195479?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le (ruby:3.1)",
"product_id": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debuginfo@0.5.4-1.module%2Bel9.1.0%2B15737%2B76195479?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le (ruby:3.1)",
"product_id": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debugsource@0.5.4-1.module%2Bel9.1.0%2B15737%2B76195479?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le (ruby:3.1)",
"product_id": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg@1.3.5-1.module%2Bel9.1.0%2B15737%2B76195479?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le (ruby:3.1)",
"product_id": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debuginfo@1.3.5-1.module%2Bel9.1.0%2B15737%2B76195479?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le (ruby:3.1)",
"product_id": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debugsource@1.3.5-1.module%2Bel9.1.0%2B15737%2B76195479?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1)",
"product_id": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych@4.0.4-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1)",
"product_id": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@4.0.4-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1)",
"product_id": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs@2.7.0-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1)",
"product_id": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs-debuginfo@2.7.0-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=ppc64le\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product": {
"name": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1)",
"product_id": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1)",
"product_id": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1)",
"product_id": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-bundled-gems-debuginfo@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product": {
"name": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1)",
"product_id": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product": {
"name": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1)",
"product_id": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debugsource@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product": {
"name": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1)",
"product_id": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product": {
"name": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1)",
"product_id": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product": {
"name": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1)",
"product_id": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs-debuginfo@3.1.7-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1)",
"product_id": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal@3.1.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1)",
"product_id": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-bigdecimal-debuginfo@3.1.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product": {
"name": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1)",
"product_id": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console@0.5.11-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1)",
"product_id": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-io-console-debuginfo@0.5.11-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product": {
"name": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1)",
"product_id": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json@2.6.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product": {
"name": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1)",
"product_id": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-json-debuginfo@2.6.1-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"product": {
"name": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x (ruby:3.1)",
"product_id": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2@0.5.4-1.module%2Bel9.1.0%2B15737%2B76195479?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"product": {
"name": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x (ruby:3.1)",
"product_id": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debuginfo@0.5.4-1.module%2Bel9.1.0%2B15737%2B76195479?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"product": {
"name": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x (ruby:3.1)",
"product_id": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-mysql2-debugsource@0.5.4-1.module%2Bel9.1.0%2B15737%2B76195479?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"product": {
"name": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x (ruby:3.1)",
"product_id": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg@1.3.5-1.module%2Bel9.1.0%2B15737%2B76195479?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"product": {
"name": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x (ruby:3.1)",
"product_id": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debuginfo@1.3.5-1.module%2Bel9.1.0%2B15737%2B76195479?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"product": {
"name": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x (ruby:3.1)",
"product_id": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-pg-debugsource@1.3.5-1.module%2Bel9.1.0%2B15737%2B76195479?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product": {
"name": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1)",
"product_id": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych@4.0.4-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product": {
"name": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1)",
"product_id": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-psych-debuginfo@4.0.4-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product": {
"name": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1)",
"product_id": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs@2.7.0-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
},
{
"category": "product_version",
"name": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1)",
"product_id": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rbs-debuginfo@2.7.0-146.module%2Bel9.5.0%2B23003%2Ba4c328ce?arch=s390x\u0026rpmmod=ruby:3.1:9050020250404144903:9"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1"
},
"product_reference": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1"
},
"product_reference": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1"
},
"product_reference": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1"
},
"product_reference": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1"
},
"product_reference": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1"
},
"product_reference": "ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1"
},
"product_reference": "ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1"
},
"product_reference": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1"
},
"product_reference": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1"
},
"product_reference": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1"
},
"product_reference": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1"
},
"product_reference": "ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1"
},
"product_reference": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1"
},
"product_reference": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1"
},
"product_reference": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1"
},
"product_reference": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1"
},
"product_reference": "ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
},
"product_reference": "ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1"
},
"product_reference": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1"
},
"product_reference": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1"
},
"product_reference": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1"
},
"product_reference": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1"
},
"product_reference": "ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
},
"product_reference": "ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1"
},
"product_reference": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1"
},
"product_reference": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1"
},
"product_reference": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1"
},
"product_reference": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1"
},
"product_reference": "ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1"
},
"product_reference": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1"
},
"product_reference": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1"
},
"product_reference": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1"
},
"product_reference": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1"
},
"product_reference": "ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1"
},
"product_reference": "rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
},
"product_reference": "rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1"
},
"product_reference": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1"
},
"product_reference": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1"
},
"product_reference": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1"
},
"product_reference": "rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1"
},
"product_reference": "rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
},
"product_reference": "rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1"
},
"product_reference": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1"
},
"product_reference": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1"
},
"product_reference": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1"
},
"product_reference": "rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1"
},
"product_reference": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1"
},
"product_reference": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1"
},
"product_reference": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1"
},
"product_reference": "rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
},
"product_reference": "rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1"
},
"product_reference": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1"
},
"product_reference": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1"
},
"product_reference": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1"
},
"product_reference": "rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1"
},
"product_reference": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1"
},
"product_reference": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1"
},
"product_reference": "rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1"
},
"product_reference": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1"
},
"product_reference": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1"
},
"product_reference": "rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1"
},
"product_reference": "rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1"
},
"product_reference": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1"
},
"product_reference": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1"
},
"product_reference": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1"
},
"product_reference": "rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1"
},
"product_reference": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1"
},
"product_reference": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1"
},
"product_reference": "rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1"
},
"product_reference": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1"
},
"product_reference": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1"
},
"product_reference": "rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1"
},
"product_reference": "rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
},
"product_reference": "rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1"
},
"product_reference": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1"
},
"product_reference": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1"
},
"product_reference": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1"
},
"product_reference": "rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1"
},
"product_reference": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1"
},
"product_reference": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1"
},
"product_reference": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1"
},
"product_reference": "rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
},
"product_reference": "rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1"
},
"product_reference": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1"
},
"product_reference": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1"
},
"product_reference": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1"
},
"product_reference": "rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1"
},
"product_reference": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1"
},
"product_reference": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1"
},
"product_reference": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1"
},
"product_reference": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64 (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1"
},
"product_reference": "rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
},
"product_reference": "rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
},
"product_reference": "rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
},
"product_reference": "rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
},
"product_reference": "rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
},
"product_reference": "rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
},
"product_reference": "rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch (ruby:3.1) as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
},
"product_reference": "rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-39908",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-07-16T18:32:33+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2298243"
}
],
"notes": [
{
"category": "description",
"text": "An uncontrolled resource consumption vulnerability was found in REXML. When parsing an untrusted XML with many specific characters such as `\u003c`, `0`, and `%\u003e`, it can lead to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rexml: DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-39908"
},
{
"category": "external",
"summary": "RHBZ#2298243",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298243"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-39908",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39908"
},
{
"category": "external",
"summary": "https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8",
"url": "https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2024/07/16/dos-rexml-cve-2024-39908",
"url": "https://www.ruby-lang.org/en/news/2024/07/16/dos-rexml-cve-2024-39908"
}
],
"release_date": "2024-07-16T06:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-06T02:33:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4488"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rexml: DoS vulnerability in REXML"
},
{
"cve": "CVE-2024-41123",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-08-01T15:30:28+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302268"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in REXML, an XML toolkit used for Ruby. When parsing an untrusted XML with many specific characters, the REXML gem may take a long time, leading to a denial of service condition. Some of these special characters include the whitespace character, \u0027\u003e]\u0027, and \u0027]\u003e\u0027.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, \u003e] and ]\u003e",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat believes this flaw to be moderate because a potential denial of service condition would create minimal impact at the application level and not the entire system.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41123"
},
{
"category": "external",
"summary": "RHBZ#2302268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302268"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41123",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41123"
},
{
"category": "external",
"summary": "https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8",
"url": "https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8"
},
{
"category": "external",
"summary": "https://github.com/ruby/rexml/security/advisories/GHSA-r55c-59qm-vjw6",
"url": "https://github.com/ruby/rexml/security/advisories/GHSA-r55c-59qm-vjw6"
},
{
"category": "external",
"summary": "https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh",
"url": "https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123",
"url": "https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123"
}
],
"release_date": "2024-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-06T02:33:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4488"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability. It is recommended to upgrade the REXML gem to fix these vulnerabilities.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, \u003e] and ]\u003e"
},
{
"cve": "CVE-2024-41946",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-08-01T15:30:43+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the REXML package. Reading an XML file that contains many entity expansions may lead to a denial of service due to resource starvation. An attacker can use this flaw to trick a user into processing an untrusted XML file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rexml: DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-41946"
},
{
"category": "external",
"summary": "RHBZ#2302272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41946",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41946"
},
{
"category": "external",
"summary": "https://github.com/ruby/rexml/commit/033d1909a8f259d5a7c53681bcaf14f13bcf0368",
"url": "https://github.com/ruby/rexml/commit/033d1909a8f259d5a7c53681bcaf14f13bcf0368"
},
{
"category": "external",
"summary": "https://github.com/ruby/rexml/security/advisories/GHSA-5866-49gr-22v4",
"url": "https://github.com/ruby/rexml/security/advisories/GHSA-5866-49gr-22v4"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml",
"url": "https://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946",
"url": "https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946"
}
],
"release_date": "2024-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-06T02:33:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4488"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rexml: DoS vulnerability in REXML"
},
{
"cve": "CVE-2024-43398",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2024-08-22T15:21:20.836180+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2307297"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in REXML RubyGems. This package is vulnerable to denial of service (DoS) when parsing a deep XML structure with the same local name attribute. This vulnerability only affects tree parser API like REXML::Document.new, other parser APIs such as stream parser API and SAX2 parser API are not affected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rexml: DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-43398"
},
{
"category": "external",
"summary": "RHBZ#2307297",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2307297"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-43398",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-43398"
},
{
"category": "external",
"summary": "https://github.com/ruby/rexml/releases/tag/v3.3.6",
"url": "https://github.com/ruby/rexml/releases/tag/v3.3.6"
},
{
"category": "external",
"summary": "https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3",
"url": "https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3"
}
],
"release_date": "2024-08-22T15:15:16.440000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-06T02:33:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4488"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rexml: DoS vulnerability in REXML"
},
{
"cve": "CVE-2025-27219",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-03-04T00:00:47.344814+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2349699"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby\u0027s CGI gem. Processing specially crafted large cookies with the CGI::Cookie.parse method can cause excessive resource consumption due to a missing limit on the length of the raw cookie value, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "CGI: Denial of Service in CGI::Cookie.parse",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue will cause an excessive resource consumption, potentially resulting in a bad application performance. However, an attacker does have the ability to completely deny service to legitimate users. For this reason, this vulnerability has been rated with a moderate severity.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-770: Allocation of Resources Without Limits or Throttling vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings required for operations, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that detect excessive resource usage caused by malicious activity or system misconfigurations. In the event of exploitation, process isolation ensures workloads operate in separate environments, preventing any single process from overconsuming CPU or memory and degrading system performance.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-27219"
},
{
"category": "external",
"summary": "RHBZ#2349699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349699"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-27219",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27219"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2025/02/26/security-advisories/",
"url": "https://www.ruby-lang.org/en/news/2025/02/26/security-advisories/"
}
],
"release_date": "2025-03-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-06T02:33:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4488"
},
{
"category": "workaround",
"details": "Do not process large cookies or strings with the CGI::Cookie.parse method from the CGI library. Adding a check to verify and limit the length of the cookie or string before processing it will mitigate this vulnerability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "CGI: Denial of Service in CGI::Cookie.parse"
},
{
"cve": "CVE-2025-27220",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2025-03-04T00:00:40.772427+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2349696"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby\u0027s CGI gem. The CGI::Util#escapeElement method is vulnerable to Regular expression Denial of Service (ReDoS), allowing a specially crafted input to cause a high CPU consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "CGI: ReDoS in CGI::Util#escapeElement",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue will cause an excessive resource consumption, potentially resulting in a degraded application performance. However, an attacker does have the ability to completely deny service to legitimate users. As such, Red hat has rated the CVSS Availability as LOW instead of HIGH.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-27220"
},
{
"category": "external",
"summary": "RHBZ#2349696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349696"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-27220",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27220"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2025/02/26/security-advisories/",
"url": "https://www.ruby-lang.org/en/news/2025/02/26/security-advisories/"
}
],
"release_date": "2025-03-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-06T02:33:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4488"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "CGI: ReDoS in CGI::Util#escapeElement"
},
{
"cve": "CVE-2025-27221",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2025-03-04T00:00:49.400177+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2349700"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the URI ruby gem package, where userinfo leakage can occur in the uri gem. The methods URI#join, URI#merge, and URI#+ retained userinfo, such as user:password, even after the host is replaced. When generating a URL to a malicious host from a URL containing secret userinfo using these methods, and having someone access that URL, an unintended userinfo leak can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "uri: userinfo leakage in URI#join, URI#merge and URI#+",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-27221"
},
{
"category": "external",
"summary": "RHBZ#2349700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2349700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-27221",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27221"
},
{
"category": "external",
"summary": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/uri/CVE-2025-27221.yml",
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/uri/CVE-2025-27221.yml"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/2957667",
"url": "https://hackerone.com/reports/2957667"
}
],
"release_date": "2025-03-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-06T02:33:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:4488"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.2,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-bundled-gems-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-debugsource-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-default-gems-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-devel-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-doc-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:ruby-libs-debuginfo-0:3.1.7-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bigdecimal-debuginfo-0:3.1.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-bundler-0:2.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-io-console-debuginfo-0:0.5.11-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-irb-0:1.4.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-json-debuginfo-0:2.6.1-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-minitest-0:5.15.0-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debuginfo-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-debugsource-0:0.5.4-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-mysql2-doc-0:0.5.4-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.src::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debuginfo-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-debugsource-0:1.3.5-1.module+el9.1.0+15737+76195479.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-pg-doc-0:1.3.5-1.module+el9.1.0+15737+76195479.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-power_assert-0:2.0.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-psych-debuginfo-0:4.0.4-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rake-0:13.0.6-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.aarch64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.i686::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.ppc64le::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.s390x::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rbs-debuginfo-0:2.7.0-146.module+el9.5.0+23003+a4c328ce.x86_64::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rdoc-0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rexml-0:3.3.9-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-rss-0:0.3.1-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-test-unit-0:3.5.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygem-typeprof-0:0.21.3-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1",
"AppStream-9.5.0.Z.MAIN:rubygems-devel-0:3.3.27-146.module+el9.5.0+23003+a4c328ce.noarch::ruby:3.1"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "uri: userinfo leakage in URI#join, URI#merge and URI#+"
}
]
}
CERTFR-2025-AVI-0622
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry Windows | ||
| VMware | N/A | Stemcells sans le dernier correctif de sécurité | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu | Anti-Virus sans le dernier correctif de sécurité pour Tanzu version 2.4.0 | ||
| VMware | Tanzu | Scheduler sans le dernier correctif de sécurité pour Tanzu version 2.0.19 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | GenAI sans le dernier correctif de sécurité pour Tanzu Platform pour Cloud Foundry version 10.2.1 | ||
| VMware | Tanzu Application Service | Tanzu Application Service versions antérieures à 1.16.11 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Services sans le dernier correctif de sécurité pour Tanzu version 3.3.8 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Data Flow sans le dernier correctif de sécurité pour Tanzu version 1.14.7 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Application Service | Single Sign-On sans le dernier correctif de sécurité pour Tanzu Application Service version 1.16.11 | ||
| VMware | Tanzu | File Integrity Monitoring sans le dernier correctif de sécurité pour Tanzu version 2.1.47 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Anti-Virus sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.4.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Scheduler sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.0.19",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "GenAI sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Platform pour Cloud Foundry version 10.2.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.11",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 3.3.8",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 1.14.7",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Application Service version 1.16.11",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "File Integrity Monitoring sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.1.47",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2023-28755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28755"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2020-36843",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36843"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-3445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3445"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2020-15250",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15250"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2024-21012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21012"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2022-25647",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25647"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-24579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24579"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-28948",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28948"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-33202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33202"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-21613",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21613"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2024-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0406"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2024-6104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6104"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-30691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30691"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46727"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2022-36056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36056"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2024-41909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41909"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2022-36109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36109"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2023-36617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36617"
},
{
"name": "CVE-2023-33199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33199"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2022-24769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24769"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2023-30551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30551"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-35929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35929"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2024-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52587"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2022-29173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29173"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2024-29902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29902"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2025-47290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47290"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2023-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46737"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2025-21614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21614"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-4949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4949"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-28756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28756"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-29903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29903"
},
{
"name": "CVE-2025-4575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4575"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2025-32441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32441"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0622",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35981",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35981"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35967",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35967"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35980",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35980"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35974",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35974"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35979",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35979"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35984",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35984"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35970",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35970"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35983",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35983"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35978",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35978"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35968",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35968"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35973",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35973"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35976",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35976"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35969",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35969"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35966",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35966"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35972",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35972"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35977",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35977"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35982",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35982"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35971",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35971"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35975",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35975"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2025-AVI-0622
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry Windows | ||
| VMware | N/A | Stemcells sans le dernier correctif de sécurité | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu | Anti-Virus sans le dernier correctif de sécurité pour Tanzu version 2.4.0 | ||
| VMware | Tanzu | Scheduler sans le dernier correctif de sécurité pour Tanzu version 2.0.19 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | GenAI sans le dernier correctif de sécurité pour Tanzu Platform pour Cloud Foundry version 10.2.1 | ||
| VMware | Tanzu Application Service | Tanzu Application Service versions antérieures à 1.16.11 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Services sans le dernier correctif de sécurité pour Tanzu version 3.3.8 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Data Flow sans le dernier correctif de sécurité pour Tanzu version 1.14.7 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Application Service | Single Sign-On sans le dernier correctif de sécurité pour Tanzu Application Service version 1.16.11 | ||
| VMware | Tanzu | File Integrity Monitoring sans le dernier correctif de sécurité pour Tanzu version 2.1.47 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Anti-Virus sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.4.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Scheduler sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.0.19",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "GenAI sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Platform pour Cloud Foundry version 10.2.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.11",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 3.3.8",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 1.14.7",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Application Service version 1.16.11",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "File Integrity Monitoring sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.1.47",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2023-28755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28755"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2020-36843",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36843"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-3445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3445"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2020-15250",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15250"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2024-21012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21012"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2022-25647",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25647"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-24579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24579"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-28948",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28948"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-33202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33202"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-21613",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21613"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2024-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0406"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2024-6104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6104"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-30691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30691"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46727"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2022-36056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36056"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2024-41909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41909"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2022-36109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36109"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2023-36617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36617"
},
{
"name": "CVE-2023-33199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33199"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2022-24769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24769"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2023-30551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30551"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-35929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35929"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2024-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52587"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2022-29173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29173"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2024-29902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29902"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2025-47290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47290"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2023-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46737"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2025-21614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21614"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-4949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4949"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-28756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28756"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-29903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29903"
},
{
"name": "CVE-2025-4575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4575"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2025-32441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32441"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0622",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35981",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35981"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35967",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35967"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35980",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35980"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35974",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35974"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35979",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35979"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35984",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35984"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35970",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35970"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35983",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35983"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35978",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35978"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35968",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35968"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35973",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35973"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35976",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35976"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35969",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35969"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35966",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35966"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35972",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35972"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35977",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35977"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35982",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35982"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35971",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35971"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35975",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35975"
}
]
}
CERTFR-2025-AVI-0512
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Security QRadar EDR | Security QRadar EDR versions antérieures à 3.12.16 | ||
| IBM | Db2 | Db2 versions antérieures à 5.2.0 pour Cloud Pak for Data | ||
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.4 FP1 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 IF4 | ||
| IBM | Db2 Warehouse | Db2 warehouse versions antérieures à 5.2.0 pour Cloud Pak for Data |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Security QRadar EDR versions ant\u00e9rieures \u00e0 3.12.16",
"product": {
"name": "Security QRadar EDR",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions ant\u00e9rieures \u00e0 5.2.0 pour Cloud Pak for Data",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.4 FP1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 IF4",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 warehouse versions ant\u00e9rieures \u00e0 5.2.0 pour Cloud Pak for Data",
"product": {
"name": "Db2 Warehouse",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-0917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0917"
},
{
"name": "CVE-2018-19361",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19361"
},
{
"name": "CVE-2023-29483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
},
{
"name": "CVE-2021-33036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33036"
},
{
"name": "CVE-2019-17267",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17267"
},
{
"name": "CVE-2024-22201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22201"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2018-14719",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14719"
},
{
"name": "CVE-2020-9546",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9546"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2025-47944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47944"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2025-30065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30065"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2024-25638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25638"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2017-9047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9047"
},
{
"name": "CVE-2020-9548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9548"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-45178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45178"
},
{
"name": "CVE-2024-47076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47076"
},
{
"name": "CVE-2024-47177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47177"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-26612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26612"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2024-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47561"
},
{
"name": "CVE-2019-16942",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16942"
},
{
"name": "CVE-2024-31881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31881"
},
{
"name": "CVE-2020-9547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9547"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2018-14718",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14718"
},
{
"name": "CVE-2025-0923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0923"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2018-19360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19360"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-31880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31880"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2019-16335",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16335"
},
{
"name": "CVE-2024-28762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28762"
},
{
"name": "CVE-2018-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7489"
},
{
"name": "CVE-2019-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14893"
},
{
"name": "CVE-2023-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50298"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-53197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53197"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2024-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23454"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2024-37529",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37529"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-25642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25642"
},
{
"name": "CVE-2024-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53382"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2020-9492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9492"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2019-16943",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16943"
},
{
"name": "CVE-2024-12905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12905"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2024-52046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52046"
},
{
"name": "CVE-2021-37404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37404"
},
{
"name": "CVE-2025-47935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47935"
},
{
"name": "CVE-2017-7525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7525"
},
{
"name": "CVE-2019-20330",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20330"
},
{
"name": "CVE-2023-44981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44981"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2019-17531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17531"
},
{
"name": "CVE-2024-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2023-52428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2020-8840",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8840"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-57965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57965"
},
{
"name": "CVE-2023-29267",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29267"
},
{
"name": "CVE-2024-31882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31882"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2018-14720",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14720"
},
{
"name": "CVE-2024-47176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47176"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2023-52922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52922"
},
{
"name": "CVE-2019-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14540"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2024-6827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6827"
},
{
"name": "CVE-2018-14721",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14721"
},
{
"name": "CVE-2018-11307",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11307"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2022-42969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42969"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"name": "CVE-2024-35152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35152"
},
{
"name": "CVE-2019-14379",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14379"
},
{
"name": "CVE-2025-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25032"
},
{
"name": "CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2024-47175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47175"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2023-39663",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39663"
},
{
"name": "CVE-2024-35136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35136"
},
{
"name": "CVE-2022-25168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25168"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2019-14892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14892"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0512",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-06-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7236500",
"url": "https://www.ibm.com/support/pages/node/7236500"
},
{
"published_at": "2025-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7234674",
"url": "https://www.ibm.com/support/pages/node/7234674"
},
{
"published_at": "2025-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7236354",
"url": "https://www.ibm.com/support/pages/node/7236354"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2025-AVI-0512
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Security QRadar EDR | Security QRadar EDR versions antérieures à 3.12.16 | ||
| IBM | Db2 | Db2 versions antérieures à 5.2.0 pour Cloud Pak for Data | ||
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.4 FP1 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 IF4 | ||
| IBM | Db2 Warehouse | Db2 warehouse versions antérieures à 5.2.0 pour Cloud Pak for Data |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Security QRadar EDR versions ant\u00e9rieures \u00e0 3.12.16",
"product": {
"name": "Security QRadar EDR",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions ant\u00e9rieures \u00e0 5.2.0 pour Cloud Pak for Data",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.4 FP1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 IF4",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 warehouse versions ant\u00e9rieures \u00e0 5.2.0 pour Cloud Pak for Data",
"product": {
"name": "Db2 Warehouse",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-0917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0917"
},
{
"name": "CVE-2018-19361",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19361"
},
{
"name": "CVE-2023-29483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
},
{
"name": "CVE-2021-33036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33036"
},
{
"name": "CVE-2019-17267",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17267"
},
{
"name": "CVE-2024-22201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22201"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2018-14719",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14719"
},
{
"name": "CVE-2020-9546",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9546"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2025-47944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47944"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2025-30065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30065"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2024-25638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25638"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2017-9047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9047"
},
{
"name": "CVE-2020-9548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9548"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-45178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45178"
},
{
"name": "CVE-2024-47076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47076"
},
{
"name": "CVE-2024-47177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47177"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-26612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26612"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2024-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47561"
},
{
"name": "CVE-2019-16942",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16942"
},
{
"name": "CVE-2024-31881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31881"
},
{
"name": "CVE-2020-9547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9547"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2018-14718",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14718"
},
{
"name": "CVE-2025-0923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0923"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2018-19360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19360"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-31880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31880"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2019-16335",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16335"
},
{
"name": "CVE-2024-28762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28762"
},
{
"name": "CVE-2018-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7489"
},
{
"name": "CVE-2019-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14893"
},
{
"name": "CVE-2023-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50298"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-53197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53197"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2024-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23454"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2024-37529",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37529"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-25642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25642"
},
{
"name": "CVE-2024-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53382"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2020-9492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9492"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2019-16943",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16943"
},
{
"name": "CVE-2024-12905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12905"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2024-52046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52046"
},
{
"name": "CVE-2021-37404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37404"
},
{
"name": "CVE-2025-47935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47935"
},
{
"name": "CVE-2017-7525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7525"
},
{
"name": "CVE-2019-20330",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20330"
},
{
"name": "CVE-2023-44981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44981"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2019-17531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17531"
},
{
"name": "CVE-2024-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2023-52428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2020-8840",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8840"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-57965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57965"
},
{
"name": "CVE-2023-29267",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29267"
},
{
"name": "CVE-2024-31882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31882"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2018-14720",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14720"
},
{
"name": "CVE-2024-47176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47176"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2023-52922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52922"
},
{
"name": "CVE-2019-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14540"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2024-6827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6827"
},
{
"name": "CVE-2018-14721",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14721"
},
{
"name": "CVE-2018-11307",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11307"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2022-42969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42969"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"name": "CVE-2024-35152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35152"
},
{
"name": "CVE-2019-14379",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14379"
},
{
"name": "CVE-2025-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25032"
},
{
"name": "CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2024-47175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47175"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2023-39663",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39663"
},
{
"name": "CVE-2024-35136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35136"
},
{
"name": "CVE-2022-25168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25168"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2019-14892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14892"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0512",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-06-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7236500",
"url": "https://www.ibm.com/support/pages/node/7236500"
},
{
"published_at": "2025-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7234674",
"url": "https://www.ibm.com/support/pages/node/7234674"
},
{
"published_at": "2025-06-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7236354",
"url": "https://www.ibm.com/support/pages/node/7236354"
}
]
}
GHSA-MHWM-JH88-3GJF
Vulnerability from github – Published: 2025-03-03 22:05 – Updated: 2025-11-04 00:32There is a possibility for Regular expression Denial of Service (ReDoS) by in the cgi gem. This vulnerability has been assigned the CVE identifier CVE-2025-27220. We recommend upgrading the cgi gem.
Details
The regular expression used in CGI::Util#escapeElement is vulnerable to ReDoS. The crafted input could lead to a high CPU consumption.
This vulnerability only affects Ruby 3.1 and 3.2. If you are using these versions, please update CGI gem to version 0.3.5.1, 0.3.7, 0.4.2 or later.
Affected versions
cgi gem versions <= 0.3.5, 0.3.6, 0.4.0 and 0.4.1.
Credits
Thanks to svalkanov for discovering this issue. Also thanks to nobu for fixing this vulnerability.
{
"affected": [
{
"package": {
"ecosystem": "RubyGems",
"name": "cgi"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.5.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "RubyGems",
"name": "cgi"
},
"ranges": [
{
"events": [
{
"introduced": "0.3.6"
},
{
"fixed": "0.3.7"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"0.3.6"
]
},
{
"package": {
"ecosystem": "RubyGems",
"name": "cgi"
},
"ranges": [
{
"events": [
{
"introduced": "0.4.0"
},
{
"fixed": "0.4.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-27220"
],
"database_specific": {
"cwe_ids": [
"CWE-1333"
],
"github_reviewed": true,
"github_reviewed_at": "2025-03-03T22:05:08Z",
"nvd_published_at": "2025-03-04T00:15:31Z",
"severity": "MODERATE"
},
"details": "There is a possibility for Regular expression Denial of Service (ReDoS) by in the cgi gem. This vulnerability has been assigned the CVE identifier CVE-2025-27220. We recommend upgrading the cgi gem.\n\n## Details\n\nThe regular expression used in `CGI::Util#escapeElement` is vulnerable to ReDoS. The crafted input could lead to a high CPU consumption.\n\nThis vulnerability only affects Ruby 3.1 and 3.2. If you are using these versions, please update CGI gem to version 0.3.5.1, 0.3.7, 0.4.2 or later.\n\n## Affected versions\n\ncgi gem versions \u003c= 0.3.5, 0.3.6, 0.4.0 and 0.4.1.\n\n## Credits\n\nThanks to svalkanov for discovering this issue.\nAlso thanks to nobu for fixing this vulnerability.",
"id": "GHSA-mhwm-jh88-3gjf",
"modified": "2025-11-04T00:32:21Z",
"published": "2025-03-03T22:05:08Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27220"
},
{
"type": "WEB",
"url": "https://github.com/ruby/cgi/pull/52"
},
{
"type": "WEB",
"url": "https://github.com/ruby/cgi/pull/53"
},
{
"type": "WEB",
"url": "https://github.com/ruby/cgi/pull/54"
},
{
"type": "WEB",
"url": "https://hackerone.com/reports/2890322"
},
{
"type": "PACKAGE",
"url": "https://github.com/ruby/cgi"
},
{
"type": "WEB",
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cgi/CVE-2025-27220.yml"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00008.html"
},
{
"type": "WEB",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"type": "WEB",
"url": "https://www.ruby-lang.org/en/news/2025/02/26/security-advisories"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "CGI has Regular Expression Denial of Service (ReDoS) potential in Util#escapeElement"
}
FKIE_CVE-2025-27220
Vulnerability from fkie_nvd - Published: 2025-03-04 00:15 - Updated: 2025-11-03 22:187.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ruby-lang:cgi:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "E7161F63-FEE1-4803-A460-FE87E323B05D",
"versionEndExcluding": "0.3.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:cgi:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "A30117BA-C46E-44BB-A581-86E43F37D6E4",
"versionEndExcluding": "0.4.2",
"versionStartIncluding": "0.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:cgi:0.3.6:*:*:*:*:ruby:*:*",
"matchCriteriaId": "8AE1C5F9-0743-49A2-8292-0018FEEF81E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DD748C02-1E5E-4D92-9C41-2BF953874C32",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8850AECE-0966-403B-A0D8-694C3ECE39D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method."
},
{
"lang": "es",
"value": "En la gema CGI anterior a 0.4.2 para Ruby, existe una vulnerabilidad de denegaci\u00f3n de servicio de expresi\u00f3n regular (ReDoS) en el m\u00e9todo Util#escapeElement."
}
],
"id": "CVE-2025-27220",
"lastModified": "2025-11-03T22:18:43.610",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4,
"source": "cve@mitre.org",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-03-04T00:15:31.693",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cgi/CVE-2025-27220.yml"
},
{
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
],
"url": "https://hackerone.com/reports/2890322"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00008.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
],
"source": "cve@mitre.org",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
WID-SEC-W-2025-1439
Vulnerability from csaf_certbund - Published: 2025-06-30 22:00 - Updated: 2025-09-23 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Dell Secure Connect Gateway ist eine Softwarel\u00f6sung, die als sicherer, zentralisierter Punkt f\u00fcr die Verwaltung des Fernzugriffs und des Supports f\u00fcr Hardware und Software von Dell Technologies dient.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Dell Secure Connect Gateway ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1439 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1439.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1439 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1439"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-260 vom 2025-06-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000337528/dsa-2025-260-dell-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03283-1 vom 2025-09-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022596.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03314-1 vom 2025-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022615.html"
}
],
"source_lang": "en-US",
"title": "Dell Secure Connect Gateway: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff",
"tracking": {
"current_release_date": "2025-09-23T22:00:00.000+00:00",
"generator": {
"date": "2025-09-24T05:21:15.583+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1439",
"initial_release_date": "2025-06-30T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-09-21T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-23T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.30.0.14",
"product": {
"name": "Dell Secure Connect Gateway \u003c5.30.0.14",
"product_id": "T044974"
}
},
{
"category": "product_version",
"name": "5.30.0.14",
"product": {
"name": "Dell Secure Connect Gateway 5.30.0.14",
"product_id": "T044974-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:secure_connect_gateway:5.30.0.14"
}
}
}
],
"category": "product_name",
"name": "Secure Connect Gateway"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-39028",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2022-39028"
},
{
"cve": "CVE-2023-4016",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2023-4016"
},
{
"cve": "CVE-2023-40403",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2023-40403"
},
{
"cve": "CVE-2023-46316",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2023-46316"
},
{
"cve": "CVE-2023-52426",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2023-52426"
},
{
"cve": "CVE-2023-52831",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2023-52831"
},
{
"cve": "CVE-2023-52924",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2023-52924"
},
{
"cve": "CVE-2023-52925",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2023-52925"
},
{
"cve": "CVE-2023-52926",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2023-52926"
},
{
"cve": "CVE-2023-52927",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2023-52927"
},
{
"cve": "CVE-2024-10041",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-10041"
},
{
"cve": "CVE-2024-11168",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-11168"
},
{
"cve": "CVE-2024-12243",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-12243"
},
{
"cve": "CVE-2024-26634",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-26634"
},
{
"cve": "CVE-2024-26708",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-26708"
},
{
"cve": "CVE-2024-26810",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-26810"
},
{
"cve": "CVE-2024-26873",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-26873"
},
{
"cve": "CVE-2024-29018",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-29018"
},
{
"cve": "CVE-2024-35826",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-35826"
},
{
"cve": "CVE-2024-35910",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-35910"
},
{
"cve": "CVE-2024-38606",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-38606"
},
{
"cve": "CVE-2024-40635",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-40635"
},
{
"cve": "CVE-2024-40980",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-40980"
},
{
"cve": "CVE-2024-41005",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-41005"
},
{
"cve": "CVE-2024-41055",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-41055"
},
{
"cve": "CVE-2024-41077",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-41077"
},
{
"cve": "CVE-2024-41149",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-41149"
},
{
"cve": "CVE-2024-42307",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-42307"
},
{
"cve": "CVE-2024-43790",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-43790"
},
{
"cve": "CVE-2024-43802",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-43802"
},
{
"cve": "CVE-2024-43820",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-43820"
},
{
"cve": "CVE-2024-44974",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-44974"
},
{
"cve": "CVE-2024-45009",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-45009"
},
{
"cve": "CVE-2024-45010",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-45010"
},
{
"cve": "CVE-2024-45306",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-45306"
},
{
"cve": "CVE-2024-46736",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-46736"
},
{
"cve": "CVE-2024-46782",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-46782"
},
{
"cve": "CVE-2024-46796",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-46796"
},
{
"cve": "CVE-2024-47220",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-47220"
},
{
"cve": "CVE-2024-47408",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-47408"
},
{
"cve": "CVE-2024-47794",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-47794"
},
{
"cve": "CVE-2024-49571",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-49571"
},
{
"cve": "CVE-2024-49761",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-49761"
},
{
"cve": "CVE-2024-49924",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-49924"
},
{
"cve": "CVE-2024-49940",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-49940"
},
{
"cve": "CVE-2024-49994",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-49994"
},
{
"cve": "CVE-2024-50029",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-50029"
},
{
"cve": "CVE-2024-50036",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-50036"
},
{
"cve": "CVE-2024-50056",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-50056"
},
{
"cve": "CVE-2024-50085",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-50085"
},
{
"cve": "CVE-2024-50126",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-50126"
},
{
"cve": "CVE-2024-50140",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-50140"
},
{
"cve": "CVE-2024-50152",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-50152"
},
{
"cve": "CVE-2024-50185",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-50185"
},
{
"cve": "CVE-2024-50290",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-50290"
},
{
"cve": "CVE-2024-50294",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-50294"
},
{
"cve": "CVE-2024-52559",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-52559"
},
{
"cve": "CVE-2024-53057",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-53057"
},
{
"cve": "CVE-2024-53063",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-53063"
},
{
"cve": "CVE-2024-53123",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-53123"
},
{
"cve": "CVE-2024-53140",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-53140"
},
{
"cve": "CVE-2024-53147",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-53147"
},
{
"cve": "CVE-2024-53163",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-53163"
},
{
"cve": "CVE-2024-53176",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-53176"
},
{
"cve": "CVE-2024-53177",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-53177"
},
{
"cve": "CVE-2024-53178",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-53178"
},
{
"cve": "CVE-2024-53226",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-53226"
},
{
"cve": "CVE-2024-53680",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-53680"
},
{
"cve": "CVE-2024-54683",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-54683"
},
{
"cve": "CVE-2024-55549",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-55549"
},
{
"cve": "CVE-2024-56171",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-56171"
},
{
"cve": "CVE-2024-56568",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-56568"
},
{
"cve": "CVE-2024-56579",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-56579"
},
{
"cve": "CVE-2024-56633",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-56633"
},
{
"cve": "CVE-2024-56638",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-56638"
},
{
"cve": "CVE-2024-56640",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-56640"
},
{
"cve": "CVE-2024-56647",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-56647"
},
{
"cve": "CVE-2024-56702",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-56702"
},
{
"cve": "CVE-2024-56703",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-56703"
},
{
"cve": "CVE-2024-56718",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-56718"
},
{
"cve": "CVE-2024-56719",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-56719"
},
{
"cve": "CVE-2024-56720",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-56720"
},
{
"cve": "CVE-2024-56751",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-56751"
},
{
"cve": "CVE-2024-56758",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-56758"
},
{
"cve": "CVE-2024-56770",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-56770"
},
{
"cve": "CVE-2024-57807",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-57807"
},
{
"cve": "CVE-2024-57834",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-57834"
},
{
"cve": "CVE-2024-57889",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-57889"
},
{
"cve": "CVE-2024-57900",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-57900"
},
{
"cve": "CVE-2024-57947",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-57947"
},
{
"cve": "CVE-2024-57948",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-57948"
},
{
"cve": "CVE-2024-57973",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-57973"
},
{
"cve": "CVE-2024-57974",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-57974"
},
{
"cve": "CVE-2024-57978",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-57978"
},
{
"cve": "CVE-2024-57979",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-57979"
},
{
"cve": "CVE-2024-57980",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-57980"
},
{
"cve": "CVE-2024-57981",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-57981"
},
{
"cve": "CVE-2024-57986",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-57986"
},
{
"cve": "CVE-2024-57990",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-57990"
},
{
"cve": "CVE-2024-57993",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-57993"
},
{
"cve": "CVE-2024-57994",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-57994"
},
{
"cve": "CVE-2024-57996",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-57996"
},
{
"cve": "CVE-2024-57997",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-57997"
},
{
"cve": "CVE-2024-57999",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-57999"
},
{
"cve": "CVE-2024-58002",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58002"
},
{
"cve": "CVE-2024-58005",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58005"
},
{
"cve": "CVE-2024-58006",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58006"
},
{
"cve": "CVE-2024-58007",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58007"
},
{
"cve": "CVE-2024-58009",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58009"
},
{
"cve": "CVE-2024-58011",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58011"
},
{
"cve": "CVE-2024-58012",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58012"
},
{
"cve": "CVE-2024-58013",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58013"
},
{
"cve": "CVE-2024-58014",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58014"
},
{
"cve": "CVE-2024-58017",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58017"
},
{
"cve": "CVE-2024-58019",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58019"
},
{
"cve": "CVE-2024-58020",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58020"
},
{
"cve": "CVE-2024-58034",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58034"
},
{
"cve": "CVE-2024-58051",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58051"
},
{
"cve": "CVE-2024-58052",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58052"
},
{
"cve": "CVE-2024-58054",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58054"
},
{
"cve": "CVE-2024-58055",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58055"
},
{
"cve": "CVE-2024-58056",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58056"
},
{
"cve": "CVE-2024-58057",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58057"
},
{
"cve": "CVE-2024-58058",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58058"
},
{
"cve": "CVE-2024-58061",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58061"
},
{
"cve": "CVE-2024-58063",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58063"
},
{
"cve": "CVE-2024-58069",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58069"
},
{
"cve": "CVE-2024-58072",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58072"
},
{
"cve": "CVE-2024-58076",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58076"
},
{
"cve": "CVE-2024-58078",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58078"
},
{
"cve": "CVE-2024-58079",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58079"
},
{
"cve": "CVE-2024-58080",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58080"
},
{
"cve": "CVE-2024-58083",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58083"
},
{
"cve": "CVE-2024-58085",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58085"
},
{
"cve": "CVE-2024-58086",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-58086"
},
{
"cve": "CVE-2024-8176",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2024-8176"
},
{
"cve": "CVE-2025-0395",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-0395"
},
{
"cve": "CVE-2025-1094",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-1094"
},
{
"cve": "CVE-2025-1215",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-1215"
},
{
"cve": "CVE-2025-1795",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-1795"
},
{
"cve": "CVE-2025-21631",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21631"
},
{
"cve": "CVE-2025-21635",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21635"
},
{
"cve": "CVE-2025-21636",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21636"
},
{
"cve": "CVE-2025-21637",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21637"
},
{
"cve": "CVE-2025-21638",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21638"
},
{
"cve": "CVE-2025-21639",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21639"
},
{
"cve": "CVE-2025-21640",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21640"
},
{
"cve": "CVE-2025-21647",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21647"
},
{
"cve": "CVE-2025-21659",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21659"
},
{
"cve": "CVE-2025-21665",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21665"
},
{
"cve": "CVE-2025-21667",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21667"
},
{
"cve": "CVE-2025-21668",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21668"
},
{
"cve": "CVE-2025-21671",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21671"
},
{
"cve": "CVE-2025-21673",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21673"
},
{
"cve": "CVE-2025-21680",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21680"
},
{
"cve": "CVE-2025-21681",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21681"
},
{
"cve": "CVE-2025-21684",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21684"
},
{
"cve": "CVE-2025-21687",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21687"
},
{
"cve": "CVE-2025-21688",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21688"
},
{
"cve": "CVE-2025-21689",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21689"
},
{
"cve": "CVE-2025-21690",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21690"
},
{
"cve": "CVE-2025-21692",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21692"
},
{
"cve": "CVE-2025-21693",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21693"
},
{
"cve": "CVE-2025-21697",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21697"
},
{
"cve": "CVE-2025-21699",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21699"
},
{
"cve": "CVE-2025-21700",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21700"
},
{
"cve": "CVE-2025-21701",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21701"
},
{
"cve": "CVE-2025-21703",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21703"
},
{
"cve": "CVE-2025-21704",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21704"
},
{
"cve": "CVE-2025-21705",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21705"
},
{
"cve": "CVE-2025-21706",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21706"
},
{
"cve": "CVE-2025-21708",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21708"
},
{
"cve": "CVE-2025-21711",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21711"
},
{
"cve": "CVE-2025-21714",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21714"
},
{
"cve": "CVE-2025-21715",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21715"
},
{
"cve": "CVE-2025-21716",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21716"
},
{
"cve": "CVE-2025-21718",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21718"
},
{
"cve": "CVE-2025-21719",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21719"
},
{
"cve": "CVE-2025-21723",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21723"
},
{
"cve": "CVE-2025-21724",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21724"
},
{
"cve": "CVE-2025-21725",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21725"
},
{
"cve": "CVE-2025-21726",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21726"
},
{
"cve": "CVE-2025-21727",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21727"
},
{
"cve": "CVE-2025-21728",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21728"
},
{
"cve": "CVE-2025-21731",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21731"
},
{
"cve": "CVE-2025-21732",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21732"
},
{
"cve": "CVE-2025-21733",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21733"
},
{
"cve": "CVE-2025-21734",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21734"
},
{
"cve": "CVE-2025-21735",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21735"
},
{
"cve": "CVE-2025-21736",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21736"
},
{
"cve": "CVE-2025-21738",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21738"
},
{
"cve": "CVE-2025-21739",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21739"
},
{
"cve": "CVE-2025-21741",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21741"
},
{
"cve": "CVE-2025-21742",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21742"
},
{
"cve": "CVE-2025-21743",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21743"
},
{
"cve": "CVE-2025-21744",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21744"
},
{
"cve": "CVE-2025-21745",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21745"
},
{
"cve": "CVE-2025-21749",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21749"
},
{
"cve": "CVE-2025-21750",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21750"
},
{
"cve": "CVE-2025-21753",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21753"
},
{
"cve": "CVE-2025-21754",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21754"
},
{
"cve": "CVE-2025-21756",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21756"
},
{
"cve": "CVE-2025-21759",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21759"
},
{
"cve": "CVE-2025-21760",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21760"
},
{
"cve": "CVE-2025-21761",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21761"
},
{
"cve": "CVE-2025-21762",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21762"
},
{
"cve": "CVE-2025-21763",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21763"
},
{
"cve": "CVE-2025-21764",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21764"
},
{
"cve": "CVE-2025-21765",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21765"
},
{
"cve": "CVE-2025-21766",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21766"
},
{
"cve": "CVE-2025-21767",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21767"
},
{
"cve": "CVE-2025-21772",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21772"
},
{
"cve": "CVE-2025-21773",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21773"
},
{
"cve": "CVE-2025-21775",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21775"
},
{
"cve": "CVE-2025-21776",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21776"
},
{
"cve": "CVE-2025-21779",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21779"
},
{
"cve": "CVE-2025-21780",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21780"
},
{
"cve": "CVE-2025-21781",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21781"
},
{
"cve": "CVE-2025-21782",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21782"
},
{
"cve": "CVE-2025-21784",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21784"
},
{
"cve": "CVE-2025-21785",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21785"
},
{
"cve": "CVE-2025-21790",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21790"
},
{
"cve": "CVE-2025-21791",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21791"
},
{
"cve": "CVE-2025-21793",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21793"
},
{
"cve": "CVE-2025-21794",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21794"
},
{
"cve": "CVE-2025-21795",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21795"
},
{
"cve": "CVE-2025-21796",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21796"
},
{
"cve": "CVE-2025-21799",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21799"
},
{
"cve": "CVE-2025-21802",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21802"
},
{
"cve": "CVE-2025-21804",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21804"
},
{
"cve": "CVE-2025-21810",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21810"
},
{
"cve": "CVE-2025-21815",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21815"
},
{
"cve": "CVE-2025-21819",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21819"
},
{
"cve": "CVE-2025-21820",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21820"
},
{
"cve": "CVE-2025-21821",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21821"
},
{
"cve": "CVE-2025-21823",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21823"
},
{
"cve": "CVE-2025-21825",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21825"
},
{
"cve": "CVE-2025-21828",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21828"
},
{
"cve": "CVE-2025-21829",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21829"
},
{
"cve": "CVE-2025-21830",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21830"
},
{
"cve": "CVE-2025-21831",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21831"
},
{
"cve": "CVE-2025-21832",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21832"
},
{
"cve": "CVE-2025-21835",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21835"
},
{
"cve": "CVE-2025-21838",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21838"
},
{
"cve": "CVE-2025-21844",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21844"
},
{
"cve": "CVE-2025-21846",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21846"
},
{
"cve": "CVE-2025-21847",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21847"
},
{
"cve": "CVE-2025-21848",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21848"
},
{
"cve": "CVE-2025-21850",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21850"
},
{
"cve": "CVE-2025-21855",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21855"
},
{
"cve": "CVE-2025-21856",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21856"
},
{
"cve": "CVE-2025-21857",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21857"
},
{
"cve": "CVE-2025-21858",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21858"
},
{
"cve": "CVE-2025-21859",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21859"
},
{
"cve": "CVE-2025-21861",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21861"
},
{
"cve": "CVE-2025-21862",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21862"
},
{
"cve": "CVE-2025-21864",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21864"
},
{
"cve": "CVE-2025-21865",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21865"
},
{
"cve": "CVE-2025-21866",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21866"
},
{
"cve": "CVE-2025-21869",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21869"
},
{
"cve": "CVE-2025-21870",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21870"
},
{
"cve": "CVE-2025-21871",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21871"
},
{
"cve": "CVE-2025-21876",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21876"
},
{
"cve": "CVE-2025-21877",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21877"
},
{
"cve": "CVE-2025-21878",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21878"
},
{
"cve": "CVE-2025-21883",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21883"
},
{
"cve": "CVE-2025-21885",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21885"
},
{
"cve": "CVE-2025-21886",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21886"
},
{
"cve": "CVE-2025-21888",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21888"
},
{
"cve": "CVE-2025-21890",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21890"
},
{
"cve": "CVE-2025-21891",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21891"
},
{
"cve": "CVE-2025-21892",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-21892"
},
{
"cve": "CVE-2025-22134",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-22134"
},
{
"cve": "CVE-2025-22228",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-22228"
},
{
"cve": "CVE-2025-22247",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-22247"
},
{
"cve": "CVE-2025-22868",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-22868"
},
{
"cve": "CVE-2025-22869",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-22869"
},
{
"cve": "CVE-2025-24014",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-24014"
},
{
"cve": "CVE-2025-24813",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-24813"
},
{
"cve": "CVE-2025-24855",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-24855"
},
{
"cve": "CVE-2025-24928",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-24928"
},
{
"cve": "CVE-2025-2588",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-2588"
},
{
"cve": "CVE-2025-26465",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-26465"
},
{
"cve": "CVE-2025-26466",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-26466"
},
{
"cve": "CVE-2025-26597",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-26597"
},
{
"cve": "CVE-2025-27113",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-27113"
},
{
"cve": "CVE-2025-27219",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-27219"
},
{
"cve": "CVE-2025-27220",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-27220"
},
{
"cve": "CVE-2025-27363",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-27363"
},
{
"cve": "CVE-2025-29087",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-29087"
},
{
"cve": "CVE-2025-29088",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-29088"
},
{
"cve": "CVE-2025-31115",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-31115"
},
{
"cve": "CVE-2025-31335",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-31335"
},
{
"cve": "CVE-2025-31650",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-31650"
},
{
"cve": "CVE-2025-31651",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-31651"
},
{
"cve": "CVE-2025-32414",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-32414"
},
{
"cve": "CVE-2025-32415",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-32415"
},
{
"cve": "CVE-2025-32728",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-32728"
},
{
"cve": "CVE-2025-3360",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-3360"
},
{
"cve": "CVE-2025-4207",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-4207"
},
{
"cve": "CVE-2025-4382",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-4382"
},
{
"cve": "CVE-2025-47268",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-47268"
},
{
"cve": "CVE-2025-4802",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-4802"
},
{
"cve": "CVE-2025-48734",
"product_status": {
"known_affected": [
"T044974",
"T002207"
]
},
"release_date": "2025-06-30T22:00:00.000+00:00",
"title": "CVE-2025-48734"
}
]
}
WID-SEC-W-2025-0438
Vulnerability from csaf_certbund - Published: 2025-02-25 23:00 - Updated: 2025-05-25 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Ruby ist eine interpretierte, objektorientierte Skriptsprache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Ruby ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen preiszugeben.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0438 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0438.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0438 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0438"
},
{
"category": "external",
"summary": "Ruby Security Advisories vom 2025-02-25",
"url": "https://www.ruby-lang.org/en/news/2025/02/26/security-advisories/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4082 vom 2025-03-10",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00008.html"
},
{
"category": "external",
"summary": "Ruby Release Notes vom 2025-03-26",
"url": "https://www.ruby-lang.org/en/news/2025/03/26/ruby-3-1-7-released/"
},
{
"category": "external",
"summary": "Ruby Release Notes vom 2025-03-26",
"url": "https://www.ruby-lang.org/en/news/2025/03/26/ruby-3-2-8-released/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7418-1 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7418-1"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-60513BDBBD vom 2025-04-11",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-60513bdbbd"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-9BEF972BB9 vom 2025-04-14",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-9bef972bb9"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7442-1 vom 2025-04-17",
"url": "https://ubuntu.com/security/notices/USN-7442-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-4063 vom 2025-04-22",
"url": "https://linux.oracle.com/errata/ELSA-2025-4063.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4063 vom 2025-04-23",
"url": "https://access.redhat.com/errata/RHSA-2025:4063"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1369-1 vom 2025-04-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020742.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4488 vom 2025-05-06",
"url": "https://access.redhat.com/errata/RHSA-2025:4488"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4493 vom 2025-05-06",
"url": "https://access.redhat.com/errata/RHSA-2025:4493"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4487 vom 2025-05-06",
"url": "https://access.redhat.com/errata/RHSA-2025:4487"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-4493 vom 2025-05-06",
"url": "https://linux.oracle.com/errata/ELSA-2025-4493.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-4488 vom 2025-05-06",
"url": "https://linux.oracle.com/errata/ELSA-2025-4488.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-4487 vom 2025-05-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-4487.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4163 vom 2025-05-12",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00015.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:8131 vom 2025-05-26",
"url": "https://access.redhat.com/errata/RHSA-2025:8131"
}
],
"source_lang": "en-US",
"title": "Ruby (CGI und URI gem): Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-05-25T22:00:00.000+00:00",
"generator": {
"date": "2025-05-26T11:00:56.245+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-0438",
"initial_release_date": "2025-02-25T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-02-25T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-03-10T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-03-25T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ruby"
},
{
"date": "2025-04-07T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2025-04-21T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-22T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-04-23T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-04-24T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-05-05T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-06T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-05-08T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-05-25T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "14"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "URI gem \u003c0.11.3",
"product": {
"name": "Open Source Ruby URI gem \u003c0.11.3",
"product_id": "T041413"
}
},
{
"category": "product_version",
"name": "URI gem 0.11.3",
"product": {
"name": "Open Source Ruby URI gem 0.11.3",
"product_id": "T041413-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ruby-lang:ruby:uri_gem__0.11.3"
}
}
},
{
"category": "product_version_range",
"name": "URI gem \u003c0.12.4",
"product": {
"name": "Open Source Ruby URI gem \u003c0.12.4",
"product_id": "T041414"
}
},
{
"category": "product_version",
"name": "URI gem 0.12.4",
"product": {
"name": "Open Source Ruby URI gem 0.12.4",
"product_id": "T041414-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ruby-lang:ruby:uri_gem__0.12.4"
}
}
},
{
"category": "product_version_range",
"name": "URI gem \u003c0.13.2",
"product": {
"name": "Open Source Ruby URI gem \u003c0.13.2",
"product_id": "T041415"
}
},
{
"category": "product_version",
"name": "URI gem 0.13.2",
"product": {
"name": "Open Source Ruby URI gem 0.13.2",
"product_id": "T041415-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ruby-lang:ruby:uri_gem__0.13.2"
}
}
},
{
"category": "product_version_range",
"name": "URI gem \u003c1.0.3",
"product": {
"name": "Open Source Ruby URI gem \u003c1.0.3",
"product_id": "T041416"
}
},
{
"category": "product_version",
"name": "URI gem 1.0.3",
"product": {
"name": "Open Source Ruby URI gem 1.0.3",
"product_id": "T041416-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ruby-lang:ruby:uri_gem__1.0.3"
}
}
},
{
"category": "product_version_range",
"name": "CGI gem \u003c0.3.5.1",
"product": {
"name": "Open Source Ruby CGI gem \u003c0.3.5.1",
"product_id": "T041417"
}
},
{
"category": "product_version",
"name": "CGI gem 0.3.5.1",
"product": {
"name": "Open Source Ruby CGI gem 0.3.5.1",
"product_id": "T041417-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ruby-lang:ruby:cgi_gem__0.3.5.1"
}
}
},
{
"category": "product_version_range",
"name": "CGI gem \u003c0.3.7",
"product": {
"name": "Open Source Ruby CGI gem \u003c0.3.7",
"product_id": "T041418"
}
},
{
"category": "product_version",
"name": "CGI gem 0.3.7",
"product": {
"name": "Open Source Ruby CGI gem 0.3.7",
"product_id": "T041418-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ruby-lang:ruby:cgi_gem__0.3.7"
}
}
},
{
"category": "product_version_range",
"name": "CGI gem \u003c0.4.2",
"product": {
"name": "Open Source Ruby CGI gem \u003c0.4.2",
"product_id": "T041419"
}
},
{
"category": "product_version",
"name": "CGI gem 0.4.2",
"product": {
"name": "Open Source Ruby CGI gem 0.4.2",
"product_id": "T041419-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ruby-lang:ruby:cgi_gem__0.4.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c3.2.8",
"product": {
"name": "Open Source Ruby \u003c3.2.8",
"product_id": "T042152"
}
},
{
"category": "product_version",
"name": "3.2.8",
"product": {
"name": "Open Source Ruby 3.2.8",
"product_id": "T042152-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ruby-lang:ruby:3.2.8"
}
}
},
{
"category": "product_version_range",
"name": "\u003c3.1.7",
"product": {
"name": "Open Source Ruby \u003c3.1.7",
"product_id": "T042153"
}
},
{
"category": "product_version",
"name": "3.1.7",
"product": {
"name": "Open Source Ruby 3.1.7",
"product_id": "T042153-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ruby-lang:ruby:3.1.7"
}
}
}
],
"category": "product_name",
"name": "Ruby"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-27219",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T041419",
"67646",
"T041418",
"T000126",
"T041417",
"T004914",
"T042152",
"T042153",
"74185"
]
},
"release_date": "2025-02-25T23:00:00.000+00:00",
"title": "CVE-2025-27219"
},
{
"cve": "CVE-2025-27220",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T041419",
"67646",
"T041418",
"T000126",
"T041417",
"T004914",
"T042152",
"T042153",
"74185"
]
},
"release_date": "2025-02-25T23:00:00.000+00:00",
"title": "CVE-2025-27220"
},
{
"cve": "CVE-2025-27221",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T041416",
"T041415",
"T041414",
"T041413",
"T004914",
"T042152",
"T042153",
"74185"
]
},
"release_date": "2025-02-25T23:00:00.000+00:00",
"title": "CVE-2025-27221"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.