Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-6176 (GCVE-0-2025-6176)
Vulnerability from cvelistv5 – Published: 2025-10-31 00:00 – Updated: 2025-10-31 16:21
VLAI?
EPSS
Title
Brotli decompression bomb DoS in scrapy/scrapy
Summary
Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.
Severity ?
7.5 (High)
CWE
- CWE-400 - Uncontrolled Resource Consumption
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| scrapy | scrapy/scrapy |
Affected:
unspecified , ≤ latest
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6176",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-31T16:15:58.870623Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-31T16:21:32.237Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "scrapy/scrapy",
"vendor": "scrapy",
"versions": [
{
"lessThanOrEqual": "latest",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400 Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-31T00:00:21.219Z",
"orgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
"shortName": "@huntr_ai"
},
"references": [
{
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"source": {
"advisory": "2c26a886-5984-47ee-a421-0d5fe1344eb0",
"discovery": "EXTERNAL"
},
"title": "Brotli decompression bomb DoS in scrapy/scrapy"
}
},
"cveMetadata": {
"assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
"assignerShortName": "@huntr_ai",
"cveId": "CVE-2025-6176",
"datePublished": "2025-10-31T00:00:21.219Z",
"dateReserved": "2025-06-16T15:14:45.766Z",
"dateUpdated": "2025-10-31T16:21:32.237Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-6176\",\"sourceIdentifier\":\"security@huntr.dev\",\"published\":\"2025-10-31T00:15:37.333\",\"lastModified\":\"2025-11-04T15:41:56.843\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"security@huntr.dev\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security@huntr.dev\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"references\":[{\"url\":\"https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0\",\"source\":\"security@huntr.dev\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-6176\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-31T16:15:58.870623Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-31T16:17:47.626Z\"}}], \"cna\": {\"title\": \"Brotli decompression bomb DoS in scrapy/scrapy\", \"source\": {\"advisory\": \"2c26a886-5984-47ee-a421-0d5fe1344eb0\", \"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"cvssV3_0\": {\"scope\": \"UNCHANGED\", \"version\": \"3.0\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"scrapy\", \"product\": \"scrapy/scrapy\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"latest\"}]}], \"references\": [{\"url\": \"https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400 Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"c09c270a-b464-47c1-9133-acb35b22c19a\", \"shortName\": \"@huntr_ai\", \"dateUpdated\": \"2025-10-31T00:00:21.219Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-6176\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-31T16:21:32.237Z\", \"dateReserved\": \"2025-06-16T15:14:45.766Z\", \"assignerOrgId\": \"c09c270a-b464-47c1-9133-acb35b22c19a\", \"datePublished\": \"2025-10-31T00:00:21.219Z\", \"assignerShortName\": \"@huntr_ai\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2026:2844
Vulnerability from csaf_redhat - Published: 2026-02-17 18:20 - Updated: 2026-02-18 19:37Summary
Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.26.1 Release.
Notes
Topic
Red Hat OpenShift Dev Spaces 3.26.1 has been released.
Details
3.26.1 includes CVE fixes for CVE-2025-15467, CVE-2025-6176, CVE-2026-1761, CVE-2026-0719, CVE-2025-61732, and CVE-2025-61726.
Red Hat OpenShift Dev Spaces provides a cloud developer workspace server and a browser-based IDE built for teams and organizations. Dev Spaces runs in OpenShift and is well-suited for container-based development.
The 3.26 release is based on Eclipse Che 7.113 and uses the DevWorkspace engine to provide support for workspaces based on devfile v2.1 and v2.2.
Users still using the v1 standard should migrate as soon as possible.
https://devfile.io/docs/2.2.0/migrating-to-devfile-v2
Dev Spaces supports OpenShift EUS releases v4.16 and higher. Users are expected to update to supported OpenShift releases in order to continue to get Dev Spaces updates.
https://access.redhat.com/support/policy/updates/openshift#crw
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Dev Spaces 3.26.1 has been released.",
"title": "Topic"
},
{
"category": "general",
"text": "3.26.1 includes CVE fixes for CVE-2025-15467, CVE-2025-6176, CVE-2026-1761, CVE-2026-0719, CVE-2025-61732, and CVE-2025-61726.\nRed Hat OpenShift Dev Spaces provides a cloud developer workspace server and a browser-based IDE built for teams and organizations. Dev Spaces runs in OpenShift and is well-suited for container-based development.\nThe 3.26 release is based on Eclipse Che 7.113 and uses the DevWorkspace engine to provide support for workspaces based on devfile v2.1 and v2.2.\nUsers still using the v1 standard should migrate as soon as possible.\nhttps://devfile.io/docs/2.2.0/migrating-to-devfile-v2\nDev Spaces supports OpenShift EUS releases v4.16 and higher. Users are expected to update to supported OpenShift releases in order to continue to get Dev Spaces updates.\nhttps://access.redhat.com/support/policy/updates/openshift#crw",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2844",
"url": "https://access.redhat.com/errata/RHSA-2026:2844"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_openshift_dev_spaces/3.26/html/administration_guide/installing-devspaces",
"url": "https://access.redhat.com/documentation/en-us/red_hat_openshift_dev_spaces/3.26/html/administration_guide/installing-devspaces"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15467",
"url": "https://access.redhat.com/security/cve/CVE-2025-15467"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61726",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61732",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6176",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-0719",
"url": "https://access.redhat.com/security/cve/CVE-2026-0719"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-1761",
"url": "https://access.redhat.com/security/cve/CVE-2026-1761"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2844.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.26.1 Release.",
"tracking": {
"current_release_date": "2026-02-18T19:37:42+00:00",
"generator": {
"date": "2026-02-18T19:37:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2844",
"initial_release_date": "2026-02-17T18:20:32+00:00",
"revision_history": [
{
"date": "2026-02-17T18:20:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-17T18:20:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-18T19:37:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product": {
"name": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_devspaces:3.26::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Dev Spaces (RHOSDS)"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3Ad93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770495424"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"product": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"product_id": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/code-sshd-rhel9@sha256%3Ae81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494649"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3A2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404535"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3A48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770764461"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3A8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404517"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"product": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"product_id": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3Af13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770759517"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3Ae724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404430"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3A619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770851052"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3A7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494431"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"product_id": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-operator-bundle@sha256%3A1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770925072"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3A25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770918006"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770332067"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3Accedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494726"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3A90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1?arch=amd64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770913862"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3Aa03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770495424"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"product": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"product_id": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"product_identification_helper": {
"purl": "pkg:oci/code-sshd-rhel9@sha256%3Aa9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494649"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3Affdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404535"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3A20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770764461"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3A24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404517"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"product": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"product_id": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3Ab503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770759517"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3A3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404430"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3Ad37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770851052"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3Ac2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494431"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3A26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770918006"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770332067"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3A38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494726"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3A1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf?arch=s390x\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770913862"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3A07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770495424"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"product_id": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/code-sshd-rhel9@sha256%3A6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494649"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3Ab01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404535"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3Acfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770764461"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3A0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404517"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"product_id": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3Aa644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770759517"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3Aee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404430"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3Ac5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770851052"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3Ab151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494431"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3Ad8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770918006"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770332067"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3A8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494726"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3Abb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472?arch=ppc64le\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770913862"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"product": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"product_id": "registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"product_identification_helper": {
"purl": "pkg:oci/code-rhel9@sha256%3A080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770495424"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"product": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"product_id": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"product_identification_helper": {
"purl": "pkg:oci/code-sshd-rhel9@sha256%3A4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494649"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"product": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"product_id": "registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"product_identification_helper": {
"purl": "pkg:oci/configbump-rhel9@sha256%3A46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404535"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"product": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"product_id": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"product_identification_helper": {
"purl": "pkg:oci/dashboard-rhel9@sha256%3Aa67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770764461"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"product": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"product_id": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"product_identification_helper": {
"purl": "pkg:oci/imagepuller-rhel9@sha256%3Ad198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404517"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"product": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"product_id": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jetbrains-ide-rhel9@sha256%3Acb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770759517"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"product": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"product_id": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/machineexec-rhel9@sha256%3A75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770404430"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"product": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"product_id": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"product_identification_helper": {
"purl": "pkg:oci/openvsx-rhel9@sha256%3Ab69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770851052"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"product": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"product_id": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"product_identification_helper": {
"purl": "pkg:oci/devspaces-rhel9-operator@sha256%3A740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494431"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"product": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"product_id": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"product_identification_helper": {
"purl": "pkg:oci/pluginregistry-rhel9@sha256%3A48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770918006"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"product": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"product_id": "registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"product_identification_helper": {
"purl": "pkg:oci/server-rhel9@sha256%3A967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770332067"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"product": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"product_id": "registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/traefik-rhel9@sha256%3A7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770494726"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64",
"product": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64",
"product_id": "registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/udi-rhel9@sha256%3Af3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5?arch=arm64\u0026repository_url=registry.redhat.io/devspaces\u0026tag=1770913862"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64"
},
"product_reference": "registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64"
},
"product_reference": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x"
},
"product_reference": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64"
},
"product_reference": "registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x"
},
"product_reference": "registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x"
},
"product_reference": "registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64"
},
"product_reference": "registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x"
},
"product_reference": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64"
},
"product_reference": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64"
},
"product_reference": "registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x"
},
"product_reference": "registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64"
},
"product_reference": "registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
},
"product_reference": "registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64 as a component of Red Hat OpenShift Dev Spaces (RHOSDS) 3.26",
"product_id": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
},
"product_reference": "registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64",
"relates_to_product_reference": "Red Hat OpenShift Dev Spaces (RHOSDS) 3.26"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6176",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-10-31T01:00:56.408048+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408762"
}
],
"notes": [
{
"category": "description",
"text": "Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in Scrapy\u0027s brotli decompression implementation allows remote attackers to trigger a denial of service by sending specially crafted brotli-compressed data. This can lead to excessive memory consumption and system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "RHBZ#2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"release_date": "2025-10-31T00:00:21.219000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T18:20:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2844"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS"
},
{
"cve": "CVE-2025-15467",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-01-16T14:21:50.710000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2430376"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. On Red Hat Enterprise Linux, OpenSSL is built with stack protections enabled which mitigate the risk of code execution though a denial-of-service condition remains possible. This vulnerability only affects applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers, such as Kerberos using the PKINIT plugin. OpenSSL versions 1.1.1 and 1.0.2 are not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15467"
},
{
"category": "external",
"summary": "RHBZ#2430376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15467"
}
],
"release_date": "2026-01-27T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T18:20:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2844"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing"
},
{
"cve": "CVE-2025-61726",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-01-28T20:01:42.791305+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2434432"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/url: Memory exhaustion in query parameter parsing in net/url",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must be able to send a specially crafted HTTP request to an application parsing URL-encoded forms with net/url, specifically a request containing a large number of unique query parameters. The request will cause the application to consume an excessive amount of memory and eventually result in a denial of service, with no impact to confidentiality or integrity. Due to this reason, this vulnerability has been rated with an important severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61726"
},
{
"category": "external",
"summary": "RHBZ#2434432",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2434432"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61726"
},
{
"category": "external",
"summary": "https://go.dev/cl/736712",
"url": "https://go.dev/cl/736712"
},
{
"category": "external",
"summary": "https://go.dev/issue/77101",
"url": "https://go.dev/issue/77101"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc",
"url": "https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4341",
"url": "https://pkg.go.dev/vuln/GO-2026-4341"
}
],
"release_date": "2026-01-28T19:30:31.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T18:20:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2844"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/url: Memory exhaustion in query parameter parsing in net/url"
},
{
"cve": "CVE-2025-61732",
"discovery_date": "2026-02-05T05:00:47.678207+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437016"
}
],
"notes": [
{
"category": "description",
"text": "A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61732"
},
{
"category": "external",
"summary": "RHBZ#2437016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61732"
},
{
"category": "external",
"summary": "https://go.dev/cl/734220",
"url": "https://go.dev/cl/734220"
},
{
"category": "external",
"summary": "https://go.dev/issue/76697",
"url": "https://go.dev/issue/76697"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
"url": "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2026-4433",
"url": "https://pkg.go.dev/vuln/GO-2026-4433"
}
],
"release_date": "2026-02-05T03:42:26.392000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T18:20:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2844"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cmd/cgo: Potential code smuggling via doc comments in cmd/cgo"
},
{
"acknowledgments": [
{
"names": [
"treeplus"
]
}
],
"cve": "CVE-2026-0719",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2026-01-08T12:09:43.352000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427906"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libsoup: Signed to Unsigned Conversion Error Leading to Stack-Based Buffer Overflow in libsoup NTLM Authentication",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has assessed this vulnerability as Important severity due to its remote exploitability and lack of authentication requirements. Successful exploitation allows an attacker to crash any client or service using libsoup\u2019s NTLM authentication mechanism. The root cause is improper handling of signed integer arithmetic, which leads to stack buffer overflow and denial-of-service.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-0719"
},
{
"category": "external",
"summary": "RHBZ#2427906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-0719",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-0719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0719"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libsoup/-/issues/477",
"url": "https://gitlab.gnome.org/GNOME/libsoup/-/issues/477"
}
],
"release_date": "2026-01-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T18:20:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2844"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libsoup: Signed to Unsigned Conversion Error Leading to Stack-Based Buffer Overflow in libsoup NTLM Authentication"
},
{
"acknowledgments": [
{
"names": [
"Naoki Wakamatsu"
]
}
],
"cve": "CVE-2026-1761",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2026-02-02T12:51:56.172000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2435961"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libsoup: Stack-Based Buffer Overflow in libsoup Multipart Response Parsingmultipart HTTP response",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This IMPORTANT flaw in libsoup involves a stack-based buffer overflow during the parsing of multipart HTTP responses. A remote attacker can exploit this vulnerability by sending a specially crafted response, leading to memory corruption and potentially arbitrary code execution or application crashes in Red Hat products that utilize libsoup to process untrusted server responses. This issue does not require authentication or user interaction.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"known_not_affected": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1761"
},
{
"category": "external",
"summary": "RHBZ#2435961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2435961"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1761",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1761"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1761",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1761"
}
],
"release_date": "2026-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T18:20:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2844"
},
{
"category": "workaround",
"details": "To mitigate this issue, applications utilizing libsoup that process HTTP responses should be configured to only communicate with trusted endpoints. Implement network egress filtering to restrict vulnerable applications from connecting to untrusted external services, thereby reducing the exposure to specially crafted multipart HTTP responses.",
"product_ids": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:07b5aa25be771e9205eeec6b99eba468e856fe613ce1f14f56fe1a1987bebff1_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:080f5c8c0036ff152960bace14a46d838aaab50d005b02741ba26d08fc040249_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:a03a86747f6191a55ba5a95383124c93fcbba2b137da04fe6b9508a2e54a2a86_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-rhel9@sha256:d93b78cc40286233dd48bf7bb91eab892329bb56367c03e4e2cf36e565917209_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:4aff583803de7ebd055aa820c3167cf60fd65c4c5192cb86af65803c552871ec_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:6c0618a262457b1e209870c64225082c01200807b2ae338063425d3aa2f96fcc_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:a9a3ee20941be2f803fc3d5ac9f14ebdc4bea275927f56696aaf9ba8b4900c74_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/code-sshd-rhel9@sha256:e81bba6aea603106046eaf3196d785d1ae63eb82b8b2d5799c2e8757ca30fb4b_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:2dd449320ffd135b13cc7a43392f8be402c6b21677e949b6cb23d90c25b2af27_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:46e17c423ab487e330913b8f7addd7f4625e5f74385104e5856c01f78ef31d09_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:b01aa02ff03139120d3316da77ec4a0b4423c3c5561a3a1113732eedabe9aecd_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/configbump-rhel9@sha256:ffdb6bd87cb727dd99df7a9b3c160bd26fc113957bb22dc442cd38ba6b56d485_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:20b0660092b3a3c069c06aae34f3306bcd655d58e33f7b8ce168aa3f21ccfef1_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:48de995db52924f4a20fc4c62c18a62223b3ef05ac5b5008dcb3628a4ee2767e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:a67220640f3cbaea11bc4e47a36fc852152620bc50a81cdf155c56374b2cc546_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/dashboard-rhel9@sha256:cfba0a1117e348ee5252289beaca5affdff3dc4a0e4cfc87f7b3ed20db16c1db_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-operator-bundle@sha256:1da81db973a6033fbe12a59e877335bf194ec4563b61e530a44326915518f788_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:740fb67de0e874261cf456ab601b9c5a2de47912d04375172c36ee2110c54594_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:7ca3cba246b8d1163fcbbb2d4798a27b5e123f36b5155e0c563747316f09b09f_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:b151b96c8187c820c6e91e6bc2a3048839e5b3dc883cec69bb04e46a875c6f74_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/devspaces-rhel9-operator@sha256:c2c57991cc8bdda2882836401980b05d81bb254d8f6002cc345fbb985e43c258_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:0265615072824fe889c5bd3d1f40d8027c38236718ec3c994bc327583e4e4885_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:24e0cccde7ea62cc4371acaa567e3e180c01941fa35844088bc73a4b27e5281e_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:8704addd93ca4fbbf4a585084775de2fe496e7641b1406a426d29e107d86119c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/imagepuller-rhel9@sha256:d198c71d91965b65f49eea8497a7574cb8d7a9599c54fa95d8d8cd12f60c6c81_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:a644a873fe159eece3e6ce341eceb7b7a4fe62f5e835e604aaf8574735d960ca_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:b503ab30512cc9bf3cfa89f5a8b09a591b038f61c22d1b2777477f40bbdbec0b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:cb7dfb0bcf96a8f8ddeea922aa9be138b734b085267e2ce6a89390a51349f57d_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/jetbrains-ide-rhel9@sha256:f13b292f3ab98895a8d07f4b4637af2c8fe0b45dd4609e3a2a2548b9dfb239d1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:3d277b876221d34650e2e7dd6368fd0892f9f535424c77ff1219df36c3972939_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:75097ff55bd9c180931c8db38709e70e3909fa17e2a7ed0949ffe02de01a468a_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:e724671480f0db043ff01c510cf3665833976806b3fb3fe64c4f186c3d445e7c_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/machineexec-rhel9@sha256:ee21dfe4d927a49196e81782875e88bd564c48c620ec07444a07387f9e4b6889_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:619c10386e0224e5228876a434c5b8d78d251bc383e2a9491503d6ceddd33c96_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:b69f3ac7efeae55c89036c589536b264f1a1e2431d120ea625c1045fc9d7de79_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:c5e4373203140944e469e0306311911cde0231b24d256bb9c65e3150558efd3c_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/openvsx-rhel9@sha256:d37e4c1f6f9bcebfb5ef805284b343d98d6e742adb589ade746321eade5863b4_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:25de67b5c2c60597173d977b2a09ecd14a9b2d60c4fd24ac0c8bf3c1ac6c000e_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:26dd9fb71bfad01a9a62e5cd83768146120efea71107c89cd8ce3361e7c73b4b_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:48d31aa446fe1033ad770ed74442053bcee5102035a9c618fb81cde1743a9692_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/pluginregistry-rhel9@sha256:d8203704e7ee44c7937b1c81166c63c002a8a09de0e38b04a3cc1e60ad94adcf_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:049c2ef7242b5ba8f80c623fb9d3a1577ade9470547119d45e5dbe1c6889b097_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:21a2cb587fce8d547f8cc31c97243bbf2bf30e8cccb64a772d60df40c909f221_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:506a7942298ea0fe39bd7cc794b9b8c374d91b38c194af3f8ec05b2d0b008205_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/server-rhel9@sha256:967d1fa6c419ed553a04addc4ca15b80ec83dc5c6899194514324eb4c79afa68_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:38f746ee7214cd30a440b754f9fa6d72e3bd802eb868e13eec139fb643e20dbc_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:7663c30c4bd9750038838a7131b680130e85f4a8d5aa41741ce4aecab7bede8b_arm64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:8ea5bdee69a073ae7a741c6fe6d770d2ed87b0c0143885fca06a49d2a0036612_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/traefik-rhel9@sha256:ccedf18e442831008f1c63721c6bf536436af0024279151044dd2d8c5e87f684_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:1a9e80f609eaf33cc252400a5e4371096dc549cbf9364e95dc6f38144fdb8bdf_s390x",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:90f6995edd69f00118cad45ab7c6d4683a99c2de2b3202f017d108cd4aadccc1_amd64",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:bb9f0ee4fa785a4c3d4a3f6f5e177f4a41350ccef40bc53bfeedee2d52061472_ppc64le",
"Red Hat OpenShift Dev Spaces (RHOSDS) 3.26:registry.redhat.io/devspaces/udi-rhel9@sha256:f3428de9e2ede29629694ab02ff8ca25543f3bc8a7300d1de95c00724e31c4b5_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libsoup: Stack-Based Buffer Overflow in libsoup Multipart Response Parsingmultipart HTTP response"
}
]
}
RHSA-2026:2401
Vulnerability from csaf_redhat - Published: 2026-02-10 09:06 - Updated: 2026-02-17 18:23Summary
Red Hat Security Advisory: brotli security update
Notes
Topic
An update for brotli is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for brotli is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. \n\nSecurity Fix(es):\n\n* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2401",
"url": "https://access.redhat.com/errata/RHSA-2026:2401"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2401.json"
}
],
"title": "Red Hat Security Advisory: brotli security update",
"tracking": {
"current_release_date": "2026-02-17T18:23:23+00:00",
"generator": {
"date": "2026-02-17T18:23:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2401",
"initial_release_date": "2026-02-10T09:06:53+00:00",
"revision_history": [
{
"date": "2026-02-10T09:06:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-10T09:06:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-17T18:23:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.6-1.el8_2.1.src",
"product": {
"name": "brotli-0:1.0.6-1.el8_2.1.src",
"product_id": "brotli-0:1.0.6-1.el8_2.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-1.el8_2.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.6-1.el8_2.1.i686",
"product": {
"name": "brotli-0:1.0.6-1.el8_2.1.i686",
"product_id": "brotli-0:1.0.6-1.el8_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-1.el8_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.6-1.el8_2.1.i686",
"product": {
"name": "brotli-debugsource-0:1.0.6-1.el8_2.1.i686",
"product_id": "brotli-debugsource-0:1.0.6-1.el8_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.6-1.el8_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.6-1.el8_2.1.i686",
"product": {
"name": "brotli-debuginfo-0:1.0.6-1.el8_2.1.i686",
"product_id": "brotli-debuginfo-0:1.0.6-1.el8_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.6-1.el8_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.i686",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.i686",
"product_id": "python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.6-1.el8_2.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.6-1.el8_2.1.x86_64",
"product": {
"name": "brotli-0:1.0.6-1.el8_2.1.x86_64",
"product_id": "brotli-0:1.0.6-1.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-1.el8_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.6-1.el8_2.1.x86_64",
"product": {
"name": "brotli-debugsource-0:1.0.6-1.el8_2.1.x86_64",
"product_id": "brotli-debugsource-0:1.0.6-1.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.6-1.el8_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64",
"product": {
"name": "brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64",
"product_id": "brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.6-1.el8_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64",
"product_id": "python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.6-1.el8_2.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-1.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:brotli-0:1.0.6-1.el8_2.1.i686"
},
"product_reference": "brotli-0:1.0.6-1.el8_2.1.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-1.el8_2.1.src as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:brotli-0:1.0.6-1.el8_2.1.src"
},
"product_reference": "brotli-0:1.0.6-1.el8_2.1.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-1.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:brotli-0:1.0.6-1.el8_2.1.x86_64"
},
"product_reference": "brotli-0:1.0.6-1.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-1.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:brotli-debuginfo-0:1.0.6-1.el8_2.1.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.6-1.el8_2.1.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-1.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:brotli-debugsource-0:1.0.6-1.el8_2.1.i686"
},
"product_reference": "brotli-debugsource-0:1.0.6-1.el8_2.1.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-1.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:brotli-debugsource-0:1.0.6-1.el8_2.1.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.6-1.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6176",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-10-31T01:00:56.408048+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408762"
}
],
"notes": [
{
"category": "description",
"text": "Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in Scrapy\u0027s brotli decompression implementation allows remote attackers to trigger a denial of service by sending specially crafted brotli-compressed data. This can lead to excessive memory consumption and system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.AUS:brotli-0:1.0.6-1.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:brotli-0:1.0.6-1.el8_2.1.src",
"BaseOS-8.2.0.Z.AUS:brotli-0:1.0.6-1.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:brotli-debuginfo-0:1.0.6-1.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:brotli-debugsource-0:1.0.6-1.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:brotli-debugsource-0:1.0.6-1.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "RHBZ#2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"release_date": "2025-10-31T00:00:21.219000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T09:06:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.AUS:brotli-0:1.0.6-1.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:brotli-0:1.0.6-1.el8_2.1.src",
"BaseOS-8.2.0.Z.AUS:brotli-0:1.0.6-1.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:brotli-debuginfo-0:1.0.6-1.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:brotli-debugsource-0:1.0.6-1.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:brotli-debugsource-0:1.0.6-1.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2401"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.AUS:brotli-0:1.0.6-1.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:brotli-0:1.0.6-1.el8_2.1.src",
"BaseOS-8.2.0.Z.AUS:brotli-0:1.0.6-1.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:brotli-debuginfo-0:1.0.6-1.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:brotli-debugsource-0:1.0.6-1.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:brotli-debugsource-0:1.0.6-1.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.AUS:brotli-0:1.0.6-1.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:brotli-0:1.0.6-1.el8_2.1.src",
"BaseOS-8.2.0.Z.AUS:brotli-0:1.0.6-1.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:brotli-debuginfo-0:1.0.6-1.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:brotli-debugsource-0:1.0.6-1.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:brotli-debugsource-0:1.0.6-1.el8_2.1.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.i686",
"BaseOS-8.2.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-1.el8_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS"
}
]
}
RHSA-2026:2228
Vulnerability from csaf_redhat - Published: 2026-02-09 02:21 - Updated: 2026-02-17 18:23Summary
Red Hat Security Advisory: brotli security update
Notes
Topic
An update for brotli is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for brotli is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. \n\nSecurity Fix(es):\n\n* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2228",
"url": "https://access.redhat.com/errata/RHSA-2026:2228"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2228.json"
}
],
"title": "Red Hat Security Advisory: brotli security update",
"tracking": {
"current_release_date": "2026-02-17T18:23:21+00:00",
"generator": {
"date": "2026-02-17T18:23:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2228",
"initial_release_date": "2026-02-09T02:21:46+00:00",
"revision_history": [
{
"date": "2026-02-09T02:21:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T02:21:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-17T18:23:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:9.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-6.el9_2.1.src",
"product": {
"name": "brotli-0:1.0.9-6.el9_2.1.src",
"product_id": "brotli-0:1.0.9-6.el9_2.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-6.el9_2.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-6.el9_2.1.s390x",
"product": {
"name": "libbrotli-0:1.0.9-6.el9_2.1.s390x",
"product_id": "libbrotli-0:1.0.9-6.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-6.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.s390x",
"product": {
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.s390x",
"product_id": "brotli-debugsource-0:1.0.9-6.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-6.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"product": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"product_id": "brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-6.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"product_id": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-6.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"product_id": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-6.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-0:1.0.9-6.el9_2.1.s390x",
"product": {
"name": "brotli-0:1.0.9-6.el9_2.1.s390x",
"product_id": "brotli-0:1.0.9-6.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-6.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-6.el9_2.1.s390x",
"product": {
"name": "brotli-devel-0:1.0.9-6.el9_2.1.s390x",
"product_id": "brotli-devel-0:1.0.9-6.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-6.el9_2.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-6.el9_2.1.s390x",
"product": {
"name": "python3-brotli-0:1.0.9-6.el9_2.1.s390x",
"product_id": "python3-brotli-0:1.0.9-6.el9_2.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-6.el9_2.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-6.el9_2.1.aarch64",
"product": {
"name": "libbrotli-0:1.0.9-6.el9_2.1.aarch64",
"product_id": "libbrotli-0:1.0.9-6.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-6.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.aarch64",
"product": {
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.aarch64",
"product_id": "brotli-debugsource-0:1.0.9-6.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-6.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"product": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"product_id": "brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-6.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"product_id": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-6.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"product_id": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-6.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-0:1.0.9-6.el9_2.1.aarch64",
"product": {
"name": "brotli-0:1.0.9-6.el9_2.1.aarch64",
"product_id": "brotli-0:1.0.9-6.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-6.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-6.el9_2.1.aarch64",
"product": {
"name": "brotli-devel-0:1.0.9-6.el9_2.1.aarch64",
"product_id": "brotli-devel-0:1.0.9-6.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-6.el9_2.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-6.el9_2.1.aarch64",
"product": {
"name": "python3-brotli-0:1.0.9-6.el9_2.1.aarch64",
"product_id": "python3-brotli-0:1.0.9-6.el9_2.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-6.el9_2.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-6.el9_2.1.ppc64le",
"product": {
"name": "libbrotli-0:1.0.9-6.el9_2.1.ppc64le",
"product_id": "libbrotli-0:1.0.9-6.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-6.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.ppc64le",
"product": {
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.ppc64le",
"product_id": "brotli-debugsource-0:1.0.9-6.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-6.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"product": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"product_id": "brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-6.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"product_id": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-6.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"product_id": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-6.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-0:1.0.9-6.el9_2.1.ppc64le",
"product": {
"name": "brotli-0:1.0.9-6.el9_2.1.ppc64le",
"product_id": "brotli-0:1.0.9-6.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-6.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-6.el9_2.1.ppc64le",
"product": {
"name": "brotli-devel-0:1.0.9-6.el9_2.1.ppc64le",
"product_id": "brotli-devel-0:1.0.9-6.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-6.el9_2.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-6.el9_2.1.ppc64le",
"product": {
"name": "python3-brotli-0:1.0.9-6.el9_2.1.ppc64le",
"product_id": "python3-brotli-0:1.0.9-6.el9_2.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-6.el9_2.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-6.el9_2.1.i686",
"product": {
"name": "libbrotli-0:1.0.9-6.el9_2.1.i686",
"product_id": "libbrotli-0:1.0.9-6.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-6.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.i686",
"product": {
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.i686",
"product_id": "brotli-debugsource-0:1.0.9-6.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-6.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"product": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"product_id": "brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-6.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"product_id": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-6.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"product_id": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-6.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-0:1.0.9-6.el9_2.1.i686",
"product": {
"name": "brotli-0:1.0.9-6.el9_2.1.i686",
"product_id": "brotli-0:1.0.9-6.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-6.el9_2.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-6.el9_2.1.i686",
"product": {
"name": "brotli-devel-0:1.0.9-6.el9_2.1.i686",
"product_id": "brotli-devel-0:1.0.9-6.el9_2.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-6.el9_2.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-6.el9_2.1.x86_64",
"product": {
"name": "libbrotli-0:1.0.9-6.el9_2.1.x86_64",
"product_id": "libbrotli-0:1.0.9-6.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-6.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.x86_64",
"product": {
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.x86_64",
"product_id": "brotli-debugsource-0:1.0.9-6.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-6.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"product": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"product_id": "brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-6.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"product_id": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-6.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"product_id": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-6.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-0:1.0.9-6.el9_2.1.x86_64",
"product": {
"name": "brotli-0:1.0.9-6.el9_2.1.x86_64",
"product_id": "brotli-0:1.0.9-6.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-6.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-6.el9_2.1.x86_64",
"product": {
"name": "brotli-devel-0:1.0.9-6.el9_2.1.x86_64",
"product_id": "brotli-devel-0:1.0.9-6.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-6.el9_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-6.el9_2.1.x86_64",
"product": {
"name": "python3-brotli-0:1.0.9-6.el9_2.1.x86_64",
"product_id": "python3-brotli-0:1.0.9-6.el9_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-6.el9_2.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.aarch64"
},
"product_reference": "brotli-0:1.0.9-6.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.i686"
},
"product_reference": "brotli-0:1.0.9-6.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.ppc64le"
},
"product_reference": "brotli-0:1.0.9-6.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.s390x"
},
"product_reference": "brotli-0:1.0.9-6.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_2.1.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.src"
},
"product_reference": "brotli-0:1.0.9-6.el9_2.1.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.x86_64"
},
"product_reference": "brotli-0:1.0.9-6.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.aarch64"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.i686"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.s390x"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.aarch64"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.i686"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.ppc64le"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.s390x"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.x86_64"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.aarch64"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.i686"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.ppc64le"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.s390x"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.x86_64"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.i686"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.s390x"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.aarch64"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.ppc64le"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.s390x"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.x86_64"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.aarch64"
},
"product_reference": "brotli-0:1.0.9-6.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.i686"
},
"product_reference": "brotli-0:1.0.9-6.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.ppc64le"
},
"product_reference": "brotli-0:1.0.9-6.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.s390x"
},
"product_reference": "brotli-0:1.0.9-6.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_2.1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.src"
},
"product_reference": "brotli-0:1.0.9-6.el9_2.1.src",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.x86_64"
},
"product_reference": "brotli-0:1.0.9-6.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.aarch64"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.i686"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.s390x"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.aarch64"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.i686"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.ppc64le"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.s390x"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.x86_64"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.aarch64"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.i686"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.ppc64le"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.s390x"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.x86_64"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.i686"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.s390x"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.aarch64"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.ppc64le"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.s390x"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.x86_64"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6176",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-10-31T01:00:56.408048+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408762"
}
],
"notes": [
{
"category": "description",
"text": "Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in Scrapy\u0027s brotli decompression implementation allows remote attackers to trigger a denial of service by sending specially crafted brotli-compressed data. This can lead to excessive memory consumption and system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.src",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.src",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "RHBZ#2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"release_date": "2025-10-31T00:00:21.219000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T02:21:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.src",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.src",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2228"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.src",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.src",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.src",
"AppStream-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.x86_64",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"AppStream-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.src",
"BaseOS-9.2.0.Z.E4S:brotli-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:libbrotli-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_2.1.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.i686",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.s390x",
"BaseOS-9.2.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS"
}
]
}
RHSA-2026:2455
Vulnerability from csaf_redhat - Published: 2026-02-10 18:32 - Updated: 2026-02-17 18:23Summary
Red Hat Security Advisory: brotli security update
Notes
Topic
An update for brotli is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for brotli is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. \n\nSecurity Fix(es):\n\n* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2455",
"url": "https://access.redhat.com/errata/RHSA-2026:2455"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2455.json"
}
],
"title": "Red Hat Security Advisory: brotli security update",
"tracking": {
"current_release_date": "2026-02-17T18:23:25+00:00",
"generator": {
"date": "2026-02-17T18:23:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2455",
"initial_release_date": "2026-02-10T18:32:23+00:00",
"revision_history": [
{
"date": "2026-02-10T18:32:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-10T18:32:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-17T18:23:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.6::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-devel-0:1.0.6-4.el8_6.i686",
"product": {
"name": "brotli-devel-0:1.0.6-4.el8_6.i686",
"product_id": "brotli-devel-0:1.0.6-4.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.6-4.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.6-4.el8_6.i686",
"product": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.i686",
"product_id": "brotli-debugsource-0:1.0.6-4.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.6-4.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"product": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"product_id": "brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.6-4.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"product_id": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.6-4.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-0:1.0.6-4.el8_6.i686",
"product": {
"name": "brotli-0:1.0.6-4.el8_6.i686",
"product_id": "brotli-0:1.0.6-4.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-4.el8_6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-devel-0:1.0.6-4.el8_6.x86_64",
"product": {
"name": "brotli-devel-0:1.0.6-4.el8_6.x86_64",
"product_id": "brotli-devel-0:1.0.6-4.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.6-4.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.6-4.el8_6.x86_64",
"product": {
"name": "python3-brotli-0:1.0.6-4.el8_6.x86_64",
"product_id": "python3-brotli-0:1.0.6-4.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.6-4.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"product": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"product_id": "brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.6-4.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"product": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"product_id": "brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.6-4.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"product_id": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.6-4.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-0:1.0.6-4.el8_6.x86_64",
"product": {
"name": "brotli-0:1.0.6-4.el8_6.x86_64",
"product_id": "brotli-0:1.0.6-4.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-4.el8_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.6-4.el8_6.src",
"product": {
"name": "brotli-0:1.0.6-4.el8_6.src",
"product_id": "brotli-0:1.0.6-4.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-4.el8_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.6-4.el8_6.aarch64",
"product": {
"name": "brotli-0:1.0.6-4.el8_6.aarch64",
"product_id": "brotli-0:1.0.6-4.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-4.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.6-4.el8_6.aarch64",
"product": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.aarch64",
"product_id": "brotli-debugsource-0:1.0.6-4.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.6-4.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"product": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"product_id": "brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.6-4.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"product_id": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.6-4.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.6-4.el8_6.aarch64",
"product": {
"name": "brotli-devel-0:1.0.6-4.el8_6.aarch64",
"product_id": "brotli-devel-0:1.0.6-4.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.6-4.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.6-4.el8_6.aarch64",
"product": {
"name": "python3-brotli-0:1.0.6-4.el8_6.aarch64",
"product_id": "python3-brotli-0:1.0.6-4.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.6-4.el8_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.6-4.el8_6.ppc64le",
"product": {
"name": "brotli-0:1.0.6-4.el8_6.ppc64le",
"product_id": "brotli-0:1.0.6-4.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-4.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.6-4.el8_6.ppc64le",
"product": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.ppc64le",
"product_id": "brotli-debugsource-0:1.0.6-4.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.6-4.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"product": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"product_id": "brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.6-4.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"product_id": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.6-4.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.6-4.el8_6.ppc64le",
"product": {
"name": "brotli-devel-0:1.0.6-4.el8_6.ppc64le",
"product_id": "brotli-devel-0:1.0.6-4.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.6-4.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.6-4.el8_6.ppc64le",
"product": {
"name": "python3-brotli-0:1.0.6-4.el8_6.ppc64le",
"product_id": "python3-brotli-0:1.0.6-4.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.6-4.el8_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.6-4.el8_6.s390x",
"product": {
"name": "brotli-0:1.0.6-4.el8_6.s390x",
"product_id": "brotli-0:1.0.6-4.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-4.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.6-4.el8_6.s390x",
"product": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.s390x",
"product_id": "brotli-debugsource-0:1.0.6-4.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.6-4.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"product": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"product_id": "brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.6-4.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"product_id": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.6-4.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.6-4.el8_6.s390x",
"product": {
"name": "brotli-devel-0:1.0.6-4.el8_6.s390x",
"product_id": "brotli-devel-0:1.0.6-4.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.6-4.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.6-4.el8_6.s390x",
"product": {
"name": "python3-brotli-0:1.0.6-4.el8_6.s390x",
"product_id": "python3-brotli-0:1.0.6-4.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.6-4.el8_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.src"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.aarch64"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.ppc64le"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.s390x"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.src"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.aarch64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.s390x"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.aarch64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.s390x"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.aarch64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.ppc64le"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.s390x"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.aarch64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.ppc64le"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.s390x"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.aarch64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.s390x"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.src"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.src"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.aarch64"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.ppc64le"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.s390x"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.src"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.aarch64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.s390x"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.aarch64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.s390x"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.aarch64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.ppc64le"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.s390x"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.aarch64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.ppc64le"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.s390x"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.aarch64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.s390x"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.src"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.i686"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6176",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-10-31T01:00:56.408048+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408762"
}
],
"notes": [
{
"category": "description",
"text": "Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in Scrapy\u0027s brotli decompression implementation allows remote attackers to trigger a denial of service by sending specially crafted brotli-compressed data. This can lead to excessive memory consumption and system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.src",
"AppStream-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.src",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.src",
"AppStream-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.src",
"BaseOS-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.src",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.src",
"BaseOS-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "RHBZ#2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"release_date": "2025-10-31T00:00:21.219000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T18:32:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.src",
"AppStream-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.src",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.src",
"AppStream-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.src",
"BaseOS-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.src",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.src",
"BaseOS-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2455"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.src",
"AppStream-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.src",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.src",
"AppStream-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.src",
"BaseOS-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.src",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.src",
"BaseOS-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.src",
"AppStream-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.src",
"AppStream-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.src",
"AppStream-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"AppStream-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.src",
"BaseOS-8.6.0.Z.AUS:brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.src",
"BaseOS-8.6.0.Z.E4S:brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.s390x",
"BaseOS-8.6.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.src",
"BaseOS-8.6.0.Z.TUS:brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_6.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.i686",
"BaseOS-8.6.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS"
}
]
}
RHSA-2026:2227
Vulnerability from csaf_redhat - Published: 2026-02-09 02:38 - Updated: 2026-02-17 18:23Summary
Red Hat Security Advisory: brotli security update
Notes
Topic
An update for brotli is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for brotli is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. \n\nSecurity Fix(es):\n\n* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2227",
"url": "https://access.redhat.com/errata/RHSA-2026:2227"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2227.json"
}
],
"title": "Red Hat Security Advisory: brotli security update",
"tracking": {
"current_release_date": "2026-02-17T18:23:20+00:00",
"generator": {
"date": "2026-02-17T18:23:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2227",
"initial_release_date": "2026-02-09T02:38:28+00:00",
"revision_history": [
{
"date": "2026-02-09T02:38:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T02:38:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-17T18:23:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.4::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-6.el9_4.1.aarch64",
"product": {
"name": "brotli-0:1.0.9-6.el9_4.1.aarch64",
"product_id": "brotli-0:1.0.9-6.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-6.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-6.el9_4.1.aarch64",
"product": {
"name": "brotli-devel-0:1.0.9-6.el9_4.1.aarch64",
"product_id": "brotli-devel-0:1.0.9-6.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-6.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-6.el9_4.1.aarch64",
"product": {
"name": "python3-brotli-0:1.0.9-6.el9_4.1.aarch64",
"product_id": "python3-brotli-0:1.0.9-6.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-6.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.aarch64",
"product": {
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.aarch64",
"product_id": "brotli-debugsource-0:1.0.9-6.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-6.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"product": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"product_id": "brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-6.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"product_id": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-6.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"product_id": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-6.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-6.el9_4.1.aarch64",
"product": {
"name": "libbrotli-0:1.0.9-6.el9_4.1.aarch64",
"product_id": "libbrotli-0:1.0.9-6.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-6.el9_4.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-6.el9_4.1.ppc64le",
"product": {
"name": "brotli-0:1.0.9-6.el9_4.1.ppc64le",
"product_id": "brotli-0:1.0.9-6.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-6.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-6.el9_4.1.ppc64le",
"product": {
"name": "brotli-devel-0:1.0.9-6.el9_4.1.ppc64le",
"product_id": "brotli-devel-0:1.0.9-6.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-6.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-6.el9_4.1.ppc64le",
"product": {
"name": "python3-brotli-0:1.0.9-6.el9_4.1.ppc64le",
"product_id": "python3-brotli-0:1.0.9-6.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-6.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.ppc64le",
"product": {
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.ppc64le",
"product_id": "brotli-debugsource-0:1.0.9-6.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-6.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"product": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"product_id": "brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-6.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"product_id": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-6.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"product_id": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-6.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-6.el9_4.1.ppc64le",
"product": {
"name": "libbrotli-0:1.0.9-6.el9_4.1.ppc64le",
"product_id": "libbrotli-0:1.0.9-6.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-6.el9_4.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-6.el9_4.1.i686",
"product": {
"name": "brotli-0:1.0.9-6.el9_4.1.i686",
"product_id": "brotli-0:1.0.9-6.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-6.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-6.el9_4.1.i686",
"product": {
"name": "brotli-devel-0:1.0.9-6.el9_4.1.i686",
"product_id": "brotli-devel-0:1.0.9-6.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-6.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.i686",
"product": {
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.i686",
"product_id": "brotli-debugsource-0:1.0.9-6.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-6.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"product": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"product_id": "brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-6.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"product_id": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-6.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"product_id": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-6.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-6.el9_4.1.i686",
"product": {
"name": "libbrotli-0:1.0.9-6.el9_4.1.i686",
"product_id": "libbrotli-0:1.0.9-6.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-6.el9_4.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-6.el9_4.1.x86_64",
"product": {
"name": "brotli-0:1.0.9-6.el9_4.1.x86_64",
"product_id": "brotli-0:1.0.9-6.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-6.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-6.el9_4.1.x86_64",
"product": {
"name": "brotli-devel-0:1.0.9-6.el9_4.1.x86_64",
"product_id": "brotli-devel-0:1.0.9-6.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-6.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-6.el9_4.1.x86_64",
"product": {
"name": "python3-brotli-0:1.0.9-6.el9_4.1.x86_64",
"product_id": "python3-brotli-0:1.0.9-6.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-6.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.x86_64",
"product": {
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.x86_64",
"product_id": "brotli-debugsource-0:1.0.9-6.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-6.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"product": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"product_id": "brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-6.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"product_id": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-6.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"product_id": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-6.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-6.el9_4.1.x86_64",
"product": {
"name": "libbrotli-0:1.0.9-6.el9_4.1.x86_64",
"product_id": "libbrotli-0:1.0.9-6.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-6.el9_4.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-6.el9_4.1.s390x",
"product": {
"name": "brotli-0:1.0.9-6.el9_4.1.s390x",
"product_id": "brotli-0:1.0.9-6.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-6.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-6.el9_4.1.s390x",
"product": {
"name": "brotli-devel-0:1.0.9-6.el9_4.1.s390x",
"product_id": "brotli-devel-0:1.0.9-6.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-6.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-6.el9_4.1.s390x",
"product": {
"name": "python3-brotli-0:1.0.9-6.el9_4.1.s390x",
"product_id": "python3-brotli-0:1.0.9-6.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-6.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.s390x",
"product": {
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.s390x",
"product_id": "brotli-debugsource-0:1.0.9-6.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-6.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"product": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"product_id": "brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-6.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"product_id": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-6.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"product_id": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-6.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-6.el9_4.1.s390x",
"product": {
"name": "libbrotli-0:1.0.9-6.el9_4.1.s390x",
"product_id": "libbrotli-0:1.0.9-6.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-6.el9_4.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-6.el9_4.1.src",
"product": {
"name": "brotli-0:1.0.9-6.el9_4.1.src",
"product_id": "brotli-0:1.0.9-6.el9_4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-6.el9_4.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.aarch64"
},
"product_reference": "brotli-0:1.0.9-6.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.i686"
},
"product_reference": "brotli-0:1.0.9-6.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.ppc64le"
},
"product_reference": "brotli-0:1.0.9-6.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.s390x"
},
"product_reference": "brotli-0:1.0.9-6.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_4.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.src"
},
"product_reference": "brotli-0:1.0.9-6.el9_4.1.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.x86_64"
},
"product_reference": "brotli-0:1.0.9-6.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.aarch64"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.i686"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.s390x"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.aarch64"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.i686"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.ppc64le"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.s390x"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.x86_64"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.aarch64"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.i686"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.ppc64le"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.s390x"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.x86_64"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.i686"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.s390x"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.aarch64"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.ppc64le"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.s390x"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.x86_64"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.aarch64"
},
"product_reference": "brotli-0:1.0.9-6.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.i686"
},
"product_reference": "brotli-0:1.0.9-6.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.ppc64le"
},
"product_reference": "brotli-0:1.0.9-6.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.s390x"
},
"product_reference": "brotli-0:1.0.9-6.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_4.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.src"
},
"product_reference": "brotli-0:1.0.9-6.el9_4.1.src",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.x86_64"
},
"product_reference": "brotli-0:1.0.9-6.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.aarch64"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.i686"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.s390x"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.aarch64"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.i686"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.ppc64le"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.s390x"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.x86_64"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.aarch64"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.i686"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.ppc64le"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.s390x"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.x86_64"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.i686"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.s390x"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.aarch64"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.ppc64le"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.s390x"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.x86_64"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6176",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-10-31T01:00:56.408048+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408762"
}
],
"notes": [
{
"category": "description",
"text": "Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in Scrapy\u0027s brotli decompression implementation allows remote attackers to trigger a denial of service by sending specially crafted brotli-compressed data. This can lead to excessive memory consumption and system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "RHBZ#2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"release_date": "2025-10-31T00:00:21.219000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T02:38:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2227"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:brotli-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:brotli-debugsource-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:brotli-devel-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libbrotli-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:python3-brotli-0:1.0.9-6.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.i686",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-6.el9_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS"
}
]
}
RHSA-2026:0008
Vulnerability from csaf_redhat - Published: 2026-01-05 01:26 - Updated: 2026-02-17 18:23Summary
Red Hat Security Advisory: brotli security update
Notes
Topic
An update for brotli is now available for Red Hat Enterprise Linux 10.0 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for brotli is now available for Red Hat Enterprise Linux 10.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. \n\nSecurity Fix(es):\n\n* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0008",
"url": "https://access.redhat.com/errata/RHSA-2026:0008"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0008.json"
}
],
"title": "Red Hat Security Advisory: brotli security update",
"tracking": {
"current_release_date": "2026-02-17T18:23:06+00:00",
"generator": {
"date": "2026-02-17T18:23:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:0008",
"initial_release_date": "2026-01-05T01:26:08+00:00",
"revision_history": [
{
"date": "2026-01-05T01:26:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-05T01:26:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-17T18:23:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux_eus:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.1.0-6.el10_0.1.aarch64",
"product": {
"name": "brotli-0:1.1.0-6.el10_0.1.aarch64",
"product_id": "brotli-0:1.1.0-6.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.1.0-6.el10_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.1.0-6.el10_0.1.aarch64",
"product": {
"name": "brotli-devel-0:1.1.0-6.el10_0.1.aarch64",
"product_id": "brotli-devel-0:1.1.0-6.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.1.0-6.el10_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.1.0-6.el10_0.1.aarch64",
"product": {
"name": "python3-brotli-0:1.1.0-6.el10_0.1.aarch64",
"product_id": "python3-brotli-0:1.1.0-6.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.1.0-6.el10_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.1.0-6.el10_0.1.aarch64",
"product": {
"name": "brotli-debugsource-0:1.1.0-6.el10_0.1.aarch64",
"product_id": "brotli-debugsource-0:1.1.0-6.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.1.0-6.el10_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"product": {
"name": "brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"product_id": "brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.1.0-6.el10_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"product": {
"name": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"product_id": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.1.0-6.el10_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"product": {
"name": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"product_id": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.1.0-6.el10_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.1.0-6.el10_0.1.aarch64",
"product": {
"name": "libbrotli-0:1.1.0-6.el10_0.1.aarch64",
"product_id": "libbrotli-0:1.1.0-6.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.1.0-6.el10_0.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.1.0-6.el10_0.1.ppc64le",
"product": {
"name": "brotli-0:1.1.0-6.el10_0.1.ppc64le",
"product_id": "brotli-0:1.1.0-6.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.1.0-6.el10_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.1.0-6.el10_0.1.ppc64le",
"product": {
"name": "brotli-devel-0:1.1.0-6.el10_0.1.ppc64le",
"product_id": "brotli-devel-0:1.1.0-6.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.1.0-6.el10_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.1.0-6.el10_0.1.ppc64le",
"product": {
"name": "python3-brotli-0:1.1.0-6.el10_0.1.ppc64le",
"product_id": "python3-brotli-0:1.1.0-6.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.1.0-6.el10_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.1.0-6.el10_0.1.ppc64le",
"product": {
"name": "brotli-debugsource-0:1.1.0-6.el10_0.1.ppc64le",
"product_id": "brotli-debugsource-0:1.1.0-6.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.1.0-6.el10_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"product": {
"name": "brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"product_id": "brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.1.0-6.el10_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"product": {
"name": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"product_id": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.1.0-6.el10_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"product": {
"name": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"product_id": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.1.0-6.el10_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.1.0-6.el10_0.1.ppc64le",
"product": {
"name": "libbrotli-0:1.1.0-6.el10_0.1.ppc64le",
"product_id": "libbrotli-0:1.1.0-6.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.1.0-6.el10_0.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.1.0-6.el10_0.1.x86_64",
"product": {
"name": "brotli-0:1.1.0-6.el10_0.1.x86_64",
"product_id": "brotli-0:1.1.0-6.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.1.0-6.el10_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.1.0-6.el10_0.1.x86_64",
"product": {
"name": "brotli-devel-0:1.1.0-6.el10_0.1.x86_64",
"product_id": "brotli-devel-0:1.1.0-6.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.1.0-6.el10_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.1.0-6.el10_0.1.x86_64",
"product": {
"name": "python3-brotli-0:1.1.0-6.el10_0.1.x86_64",
"product_id": "python3-brotli-0:1.1.0-6.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.1.0-6.el10_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.1.0-6.el10_0.1.x86_64",
"product": {
"name": "brotli-debugsource-0:1.1.0-6.el10_0.1.x86_64",
"product_id": "brotli-debugsource-0:1.1.0-6.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.1.0-6.el10_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"product": {
"name": "brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"product_id": "brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.1.0-6.el10_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"product": {
"name": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"product_id": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.1.0-6.el10_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"product": {
"name": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"product_id": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.1.0-6.el10_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.1.0-6.el10_0.1.x86_64",
"product": {
"name": "libbrotli-0:1.1.0-6.el10_0.1.x86_64",
"product_id": "libbrotli-0:1.1.0-6.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.1.0-6.el10_0.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.1.0-6.el10_0.1.s390x",
"product": {
"name": "brotli-0:1.1.0-6.el10_0.1.s390x",
"product_id": "brotli-0:1.1.0-6.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.1.0-6.el10_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.1.0-6.el10_0.1.s390x",
"product": {
"name": "brotli-devel-0:1.1.0-6.el10_0.1.s390x",
"product_id": "brotli-devel-0:1.1.0-6.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.1.0-6.el10_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.1.0-6.el10_0.1.s390x",
"product": {
"name": "python3-brotli-0:1.1.0-6.el10_0.1.s390x",
"product_id": "python3-brotli-0:1.1.0-6.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.1.0-6.el10_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.1.0-6.el10_0.1.s390x",
"product": {
"name": "brotli-debugsource-0:1.1.0-6.el10_0.1.s390x",
"product_id": "brotli-debugsource-0:1.1.0-6.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.1.0-6.el10_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"product": {
"name": "brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"product_id": "brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.1.0-6.el10_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"product": {
"name": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"product_id": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.1.0-6.el10_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"product": {
"name": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"product_id": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.1.0-6.el10_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.1.0-6.el10_0.1.s390x",
"product": {
"name": "libbrotli-0:1.1.0-6.el10_0.1.s390x",
"product_id": "libbrotli-0:1.1.0-6.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.1.0-6.el10_0.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.1.0-6.el10_0.1.src",
"product": {
"name": "brotli-0:1.1.0-6.el10_0.1.src",
"product_id": "brotli-0:1.1.0-6.el10_0.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.1.0-6.el10_0.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-6.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.aarch64"
},
"product_reference": "brotli-0:1.1.0-6.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-6.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.ppc64le"
},
"product_reference": "brotli-0:1.1.0-6.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-6.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.s390x"
},
"product_reference": "brotli-0:1.1.0-6.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-6.el10_0.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.src"
},
"product_reference": "brotli-0:1.1.0-6.el10_0.1.src",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-6.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.x86_64"
},
"product_reference": "brotli-0:1.1.0-6.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64"
},
"product_reference": "brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x"
},
"product_reference": "brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.1.0-6.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.aarch64"
},
"product_reference": "brotli-debugsource-0:1.1.0-6.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.1.0-6.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.1.0-6.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.1.0-6.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.s390x"
},
"product_reference": "brotli-debugsource-0:1.1.0-6.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.1.0-6.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.x86_64"
},
"product_reference": "brotli-debugsource-0:1.1.0-6.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.1.0-6.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.aarch64"
},
"product_reference": "brotli-devel-0:1.1.0-6.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.1.0-6.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.ppc64le"
},
"product_reference": "brotli-devel-0:1.1.0-6.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.1.0-6.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.s390x"
},
"product_reference": "brotli-devel-0:1.1.0-6.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.1.0-6.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.x86_64"
},
"product_reference": "brotli-devel-0:1.1.0-6.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.1.0-6.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.aarch64"
},
"product_reference": "libbrotli-0:1.1.0-6.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.1.0-6.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.ppc64le"
},
"product_reference": "libbrotli-0:1.1.0-6.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.1.0-6.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.s390x"
},
"product_reference": "libbrotli-0:1.1.0-6.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.1.0-6.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.x86_64"
},
"product_reference": "libbrotli-0:1.1.0-6.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64"
},
"product_reference": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le"
},
"product_reference": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.s390x"
},
"product_reference": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64"
},
"product_reference": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.1.0-6.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.aarch64"
},
"product_reference": "python3-brotli-0:1.1.0-6.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.1.0-6.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.ppc64le"
},
"product_reference": "python3-brotli-0:1.1.0-6.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.1.0-6.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.s390x"
},
"product_reference": "python3-brotli-0:1.1.0-6.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.1.0-6.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.x86_64"
},
"product_reference": "python3-brotli-0:1.1.0-6.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64"
},
"product_reference": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x"
},
"product_reference": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 10.0)",
"product_id": "AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-6.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.aarch64"
},
"product_reference": "brotli-0:1.1.0-6.el10_0.1.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-6.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.ppc64le"
},
"product_reference": "brotli-0:1.1.0-6.el10_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-6.el10_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.s390x"
},
"product_reference": "brotli-0:1.1.0-6.el10_0.1.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-6.el10_0.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.src"
},
"product_reference": "brotli-0:1.1.0-6.el10_0.1.src",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-6.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.x86_64"
},
"product_reference": "brotli-0:1.1.0-6.el10_0.1.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64"
},
"product_reference": "brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x"
},
"product_reference": "brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.1.0-6.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.aarch64"
},
"product_reference": "brotli-debugsource-0:1.1.0-6.el10_0.1.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.1.0-6.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.1.0-6.el10_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.1.0-6.el10_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.s390x"
},
"product_reference": "brotli-debugsource-0:1.1.0-6.el10_0.1.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.1.0-6.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.x86_64"
},
"product_reference": "brotli-debugsource-0:1.1.0-6.el10_0.1.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.1.0-6.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.aarch64"
},
"product_reference": "brotli-devel-0:1.1.0-6.el10_0.1.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.1.0-6.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.ppc64le"
},
"product_reference": "brotli-devel-0:1.1.0-6.el10_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.1.0-6.el10_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.s390x"
},
"product_reference": "brotli-devel-0:1.1.0-6.el10_0.1.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.1.0-6.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.x86_64"
},
"product_reference": "brotli-devel-0:1.1.0-6.el10_0.1.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.1.0-6.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.aarch64"
},
"product_reference": "libbrotli-0:1.1.0-6.el10_0.1.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.1.0-6.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.ppc64le"
},
"product_reference": "libbrotli-0:1.1.0-6.el10_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.1.0-6.el10_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.s390x"
},
"product_reference": "libbrotli-0:1.1.0-6.el10_0.1.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.1.0-6.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.x86_64"
},
"product_reference": "libbrotli-0:1.1.0-6.el10_0.1.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64"
},
"product_reference": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le"
},
"product_reference": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.s390x"
},
"product_reference": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64"
},
"product_reference": "libbrotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.1.0-6.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.aarch64"
},
"product_reference": "python3-brotli-0:1.1.0-6.el10_0.1.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.1.0-6.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.ppc64le"
},
"product_reference": "python3-brotli-0:1.1.0-6.el10_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.1.0-6.el10_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.s390x"
},
"product_reference": "python3-brotli-0:1.1.0-6.el10_0.1.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.1.0-6.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.x86_64"
},
"product_reference": "python3-brotli-0:1.1.0-6.el10_0.1.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64"
},
"product_reference": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x"
},
"product_reference": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 10.0)",
"product_id": "BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z.E2S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6176",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-10-31T01:00:56.408048+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408762"
}
],
"notes": [
{
"category": "description",
"text": "Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in Scrapy\u0027s brotli decompression implementation allows remote attackers to trigger a denial of service by sending specially crafted brotli-compressed data. This can lead to excessive memory consumption and system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.src",
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.src",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "RHBZ#2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"release_date": "2025-10-31T00:00:21.219000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-05T01:26:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.src",
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.src",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0008"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.src",
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.src",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.src",
"AppStream-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.x86_64",
"AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"AppStream-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.src",
"BaseOS-10.0.Z.E2S:brotli-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:brotli-debugsource-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:brotli-devel-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:libbrotli-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:libbrotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:python3-brotli-0:1.1.0-6.el10_0.1.x86_64",
"BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.aarch64",
"BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.ppc64le",
"BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.s390x",
"BaseOS-10.0.Z.E2S:python3-brotli-debuginfo-0:1.1.0-6.el10_0.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS"
}
]
}
RHSA-2026:2400
Vulnerability from csaf_redhat - Published: 2026-02-10 09:17 - Updated: 2026-02-17 18:23Summary
Red Hat Security Advisory: brotli security update
Notes
Topic
An update for brotli is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for brotli is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. \n\nSecurity Fix(es):\n\n* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2400",
"url": "https://access.redhat.com/errata/RHSA-2026:2400"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2400.json"
}
],
"title": "Red Hat Security Advisory: brotli security update",
"tracking": {
"current_release_date": "2026-02-17T18:23:23+00:00",
"generator": {
"date": "2026-02-17T18:23:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2400",
"initial_release_date": "2026-02-10T09:17:16+00:00",
"revision_history": [
{
"date": "2026-02-10T09:17:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-10T09:17:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-17T18:23:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.6-4.el8_8.src",
"product": {
"name": "brotli-0:1.0.6-4.el8_8.src",
"product_id": "brotli-0:1.0.6-4.el8_8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-4.el8_8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.6-4.el8_8.ppc64le",
"product": {
"name": "brotli-0:1.0.6-4.el8_8.ppc64le",
"product_id": "brotli-0:1.0.6-4.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-4.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.6-4.el8_8.ppc64le",
"product": {
"name": "brotli-debugsource-0:1.0.6-4.el8_8.ppc64le",
"product_id": "brotli-debugsource-0:1.0.6-4.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.6-4.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"product": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"product_id": "brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.6-4.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"product_id": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.6-4.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.6-4.el8_8.ppc64le",
"product": {
"name": "brotli-devel-0:1.0.6-4.el8_8.ppc64le",
"product_id": "brotli-devel-0:1.0.6-4.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.6-4.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.6-4.el8_8.ppc64le",
"product": {
"name": "python3-brotli-0:1.0.6-4.el8_8.ppc64le",
"product_id": "python3-brotli-0:1.0.6-4.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.6-4.el8_8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.6-4.el8_8.i686",
"product": {
"name": "brotli-0:1.0.6-4.el8_8.i686",
"product_id": "brotli-0:1.0.6-4.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-4.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.6-4.el8_8.i686",
"product": {
"name": "brotli-debugsource-0:1.0.6-4.el8_8.i686",
"product_id": "brotli-debugsource-0:1.0.6-4.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.6-4.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"product": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"product_id": "brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.6-4.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"product_id": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.6-4.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.6-4.el8_8.i686",
"product": {
"name": "brotli-devel-0:1.0.6-4.el8_8.i686",
"product_id": "brotli-devel-0:1.0.6-4.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.6-4.el8_8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.6-4.el8_8.x86_64",
"product": {
"name": "brotli-0:1.0.6-4.el8_8.x86_64",
"product_id": "brotli-0:1.0.6-4.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-4.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"product": {
"name": "brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"product_id": "brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.6-4.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"product": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"product_id": "brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.6-4.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"product_id": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.6-4.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.6-4.el8_8.x86_64",
"product": {
"name": "brotli-devel-0:1.0.6-4.el8_8.x86_64",
"product_id": "brotli-devel-0:1.0.6-4.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.6-4.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.6-4.el8_8.x86_64",
"product": {
"name": "python3-brotli-0:1.0.6-4.el8_8.x86_64",
"product_id": "python3-brotli-0:1.0.6-4.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.6-4.el8_8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.i686"
},
"product_reference": "brotli-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.ppc64le"
},
"product_reference": "brotli-0:1.0.6-4.el8_8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_8.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.src"
},
"product_reference": "brotli-0:1.0.6-4.el8_8.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "brotli-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.i686"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.i686"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.ppc64le"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.ppc64le"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.i686"
},
"product_reference": "brotli-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_8.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.src"
},
"product_reference": "brotli-0:1.0.6-4.el8_8.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "brotli-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.i686"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.i686"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.i686"
},
"product_reference": "brotli-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.ppc64le"
},
"product_reference": "brotli-0:1.0.6-4.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_8.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.src"
},
"product_reference": "brotli-0:1.0.6-4.el8_8.src",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "brotli-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.i686"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.i686"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.ppc64le"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.ppc64le"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.i686"
},
"product_reference": "brotli-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_8.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.src"
},
"product_reference": "brotli-0:1.0.6-4.el8_8.src",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "brotli-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.i686"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.i686"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6176",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-10-31T01:00:56.408048+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408762"
}
],
"notes": [
{
"category": "description",
"text": "Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in Scrapy\u0027s brotli decompression implementation allows remote attackers to trigger a denial of service by sending specially crafted brotli-compressed data. This can lead to excessive memory consumption and system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.src",
"AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.src",
"AppStream-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.src",
"BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.src",
"BaseOS-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "RHBZ#2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"release_date": "2025-10-31T00:00:21.219000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T09:17:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.src",
"AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.src",
"AppStream-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.src",
"BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.src",
"BaseOS-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2400"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.src",
"AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.src",
"AppStream-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.src",
"BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.src",
"BaseOS-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.src",
"AppStream-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.src",
"AppStream-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_8.x86_64",
"AppStream-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"AppStream-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.src",
"BaseOS-8.8.0.Z.E4S:brotli-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:brotli-devel-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-brotli-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.src",
"BaseOS-8.8.0.Z.TUS:brotli-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:brotli-debuginfo-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:brotli-debugsource-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:brotli-devel-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-brotli-0:1.0.6-4.el8_8.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.i686",
"BaseOS-8.8.0.Z.TUS:python3-brotli-debuginfo-0:1.0.6-4.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS"
}
]
}
RHSA-2026:2229
Vulnerability from csaf_redhat - Published: 2026-02-09 02:33 - Updated: 2026-02-17 18:23Summary
Red Hat Security Advisory: brotli security update
Notes
Topic
An update for brotli is now available for Red Hat Enterprise Linux 9.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for brotli is now available for Red Hat Enterprise Linux 9.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. \n\nSecurity Fix(es):\n\n* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2229",
"url": "https://access.redhat.com/errata/RHSA-2026:2229"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2229.json"
}
],
"title": "Red Hat Security Advisory: brotli security update",
"tracking": {
"current_release_date": "2026-02-17T18:23:22+00:00",
"generator": {
"date": "2026-02-17T18:23:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2229",
"initial_release_date": "2026-02-09T02:33:11+00:00",
"revision_history": [
{
"date": "2026-02-09T02:33:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T02:33:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-17T18:23:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.6::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-7.el9_6.1.s390x",
"product": {
"name": "brotli-0:1.0.9-7.el9_6.1.s390x",
"product_id": "brotli-0:1.0.9-7.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-7.el9_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-7.el9_6.1.s390x",
"product": {
"name": "brotli-devel-0:1.0.9-7.el9_6.1.s390x",
"product_id": "brotli-devel-0:1.0.9-7.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-7.el9_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-7.el9_6.1.s390x",
"product": {
"name": "python3-brotli-0:1.0.9-7.el9_6.1.s390x",
"product_id": "python3-brotli-0:1.0.9-7.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-7.el9_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.s390x",
"product": {
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.s390x",
"product_id": "brotli-debugsource-0:1.0.9-7.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-7.el9_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"product": {
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"product_id": "brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-7.el9_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"product_id": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-7.el9_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"product_id": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-7.el9_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-7.el9_6.1.s390x",
"product": {
"name": "libbrotli-0:1.0.9-7.el9_6.1.s390x",
"product_id": "libbrotli-0:1.0.9-7.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-7.el9_6.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-7.el9_6.1.aarch64",
"product": {
"name": "brotli-0:1.0.9-7.el9_6.1.aarch64",
"product_id": "brotli-0:1.0.9-7.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-7.el9_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-7.el9_6.1.aarch64",
"product": {
"name": "brotli-devel-0:1.0.9-7.el9_6.1.aarch64",
"product_id": "brotli-devel-0:1.0.9-7.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-7.el9_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-7.el9_6.1.aarch64",
"product": {
"name": "python3-brotli-0:1.0.9-7.el9_6.1.aarch64",
"product_id": "python3-brotli-0:1.0.9-7.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-7.el9_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.aarch64",
"product": {
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.aarch64",
"product_id": "brotli-debugsource-0:1.0.9-7.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-7.el9_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"product": {
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"product_id": "brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-7.el9_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"product_id": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-7.el9_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"product_id": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-7.el9_6.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-7.el9_6.1.aarch64",
"product": {
"name": "libbrotli-0:1.0.9-7.el9_6.1.aarch64",
"product_id": "libbrotli-0:1.0.9-7.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-7.el9_6.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-7.el9_6.1.ppc64le",
"product": {
"name": "brotli-0:1.0.9-7.el9_6.1.ppc64le",
"product_id": "brotli-0:1.0.9-7.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-7.el9_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-7.el9_6.1.ppc64le",
"product": {
"name": "brotli-devel-0:1.0.9-7.el9_6.1.ppc64le",
"product_id": "brotli-devel-0:1.0.9-7.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-7.el9_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-7.el9_6.1.ppc64le",
"product": {
"name": "python3-brotli-0:1.0.9-7.el9_6.1.ppc64le",
"product_id": "python3-brotli-0:1.0.9-7.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-7.el9_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.ppc64le",
"product": {
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.ppc64le",
"product_id": "brotli-debugsource-0:1.0.9-7.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-7.el9_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"product": {
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"product_id": "brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-7.el9_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"product_id": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-7.el9_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"product_id": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-7.el9_6.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-7.el9_6.1.ppc64le",
"product": {
"name": "libbrotli-0:1.0.9-7.el9_6.1.ppc64le",
"product_id": "libbrotli-0:1.0.9-7.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-7.el9_6.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-7.el9_6.1.i686",
"product": {
"name": "brotli-0:1.0.9-7.el9_6.1.i686",
"product_id": "brotli-0:1.0.9-7.el9_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-7.el9_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-7.el9_6.1.i686",
"product": {
"name": "brotli-devel-0:1.0.9-7.el9_6.1.i686",
"product_id": "brotli-devel-0:1.0.9-7.el9_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-7.el9_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.i686",
"product": {
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.i686",
"product_id": "brotli-debugsource-0:1.0.9-7.el9_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-7.el9_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"product": {
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"product_id": "brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-7.el9_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"product_id": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-7.el9_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"product_id": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-7.el9_6.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-7.el9_6.1.i686",
"product": {
"name": "libbrotli-0:1.0.9-7.el9_6.1.i686",
"product_id": "libbrotli-0:1.0.9-7.el9_6.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-7.el9_6.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-7.el9_6.1.x86_64",
"product": {
"name": "brotli-0:1.0.9-7.el9_6.1.x86_64",
"product_id": "brotli-0:1.0.9-7.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-7.el9_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-7.el9_6.1.x86_64",
"product": {
"name": "brotli-devel-0:1.0.9-7.el9_6.1.x86_64",
"product_id": "brotli-devel-0:1.0.9-7.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-7.el9_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-7.el9_6.1.x86_64",
"product": {
"name": "python3-brotli-0:1.0.9-7.el9_6.1.x86_64",
"product_id": "python3-brotli-0:1.0.9-7.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-7.el9_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.x86_64",
"product": {
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.x86_64",
"product_id": "brotli-debugsource-0:1.0.9-7.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-7.el9_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"product": {
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"product_id": "brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-7.el9_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"product_id": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-7.el9_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"product_id": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-7.el9_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-7.el9_6.1.x86_64",
"product": {
"name": "libbrotli-0:1.0.9-7.el9_6.1.x86_64",
"product_id": "libbrotli-0:1.0.9-7.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-7.el9_6.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-7.el9_6.1.src",
"product": {
"name": "brotli-0:1.0.9-7.el9_6.1.src",
"product_id": "brotli-0:1.0.9-7.el9_6.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-7.el9_6.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-7.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.aarch64"
},
"product_reference": "brotli-0:1.0.9-7.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-7.el9_6.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.i686"
},
"product_reference": "brotli-0:1.0.9-7.el9_6.1.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-7.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.ppc64le"
},
"product_reference": "brotli-0:1.0.9-7.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-7.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.s390x"
},
"product_reference": "brotli-0:1.0.9-7.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-7.el9_6.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.src"
},
"product_reference": "brotli-0:1.0.9-7.el9_6.1.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-7.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.x86_64"
},
"product_reference": "brotli-0:1.0.9-7.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x"
},
"product_reference": "brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.aarch64"
},
"product_reference": "brotli-debugsource-0:1.0.9-7.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.i686"
},
"product_reference": "brotli-debugsource-0:1.0.9-7.el9_6.1.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.0.9-7.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.s390x"
},
"product_reference": "brotli-debugsource-0:1.0.9-7.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.9-7.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-7.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.aarch64"
},
"product_reference": "brotli-devel-0:1.0.9-7.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-7.el9_6.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.i686"
},
"product_reference": "brotli-devel-0:1.0.9-7.el9_6.1.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-7.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.ppc64le"
},
"product_reference": "brotli-devel-0:1.0.9-7.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-7.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.s390x"
},
"product_reference": "brotli-devel-0:1.0.9-7.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-7.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.x86_64"
},
"product_reference": "brotli-devel-0:1.0.9-7.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-7.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.aarch64"
},
"product_reference": "libbrotli-0:1.0.9-7.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-7.el9_6.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.i686"
},
"product_reference": "libbrotli-0:1.0.9-7.el9_6.1.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-7.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.ppc64le"
},
"product_reference": "libbrotli-0:1.0.9-7.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-7.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.s390x"
},
"product_reference": "libbrotli-0:1.0.9-7.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-7.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.x86_64"
},
"product_reference": "libbrotli-0:1.0.9-7.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.i686"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.s390x"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-7.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.aarch64"
},
"product_reference": "python3-brotli-0:1.0.9-7.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-7.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.ppc64le"
},
"product_reference": "python3-brotli-0:1.0.9-7.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-7.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.s390x"
},
"product_reference": "python3-brotli-0:1.0.9-7.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-7.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.x86_64"
},
"product_reference": "python3-brotli-0:1.0.9-7.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.6)",
"product_id": "AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-7.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.aarch64"
},
"product_reference": "brotli-0:1.0.9-7.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-7.el9_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.i686"
},
"product_reference": "brotli-0:1.0.9-7.el9_6.1.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-7.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.ppc64le"
},
"product_reference": "brotli-0:1.0.9-7.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-7.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.s390x"
},
"product_reference": "brotli-0:1.0.9-7.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-7.el9_6.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.src"
},
"product_reference": "brotli-0:1.0.9-7.el9_6.1.src",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-7.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.x86_64"
},
"product_reference": "brotli-0:1.0.9-7.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x"
},
"product_reference": "brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.aarch64"
},
"product_reference": "brotli-debugsource-0:1.0.9-7.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.i686"
},
"product_reference": "brotli-debugsource-0:1.0.9-7.el9_6.1.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.0.9-7.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.s390x"
},
"product_reference": "brotli-debugsource-0:1.0.9-7.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-7.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.9-7.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-7.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.aarch64"
},
"product_reference": "brotli-devel-0:1.0.9-7.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-7.el9_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.i686"
},
"product_reference": "brotli-devel-0:1.0.9-7.el9_6.1.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-7.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.ppc64le"
},
"product_reference": "brotli-devel-0:1.0.9-7.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-7.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.s390x"
},
"product_reference": "brotli-devel-0:1.0.9-7.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-7.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.x86_64"
},
"product_reference": "brotli-devel-0:1.0.9-7.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-7.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.aarch64"
},
"product_reference": "libbrotli-0:1.0.9-7.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-7.el9_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.i686"
},
"product_reference": "libbrotli-0:1.0.9-7.el9_6.1.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-7.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.ppc64le"
},
"product_reference": "libbrotli-0:1.0.9-7.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-7.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.s390x"
},
"product_reference": "libbrotli-0:1.0.9-7.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-7.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.x86_64"
},
"product_reference": "libbrotli-0:1.0.9-7.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.i686"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.s390x"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-7.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.aarch64"
},
"product_reference": "python3-brotli-0:1.0.9-7.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-7.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.ppc64le"
},
"product_reference": "python3-brotli-0:1.0.9-7.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-7.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.s390x"
},
"product_reference": "python3-brotli-0:1.0.9-7.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-7.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.x86_64"
},
"product_reference": "python3-brotli-0:1.0.9-7.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.6)",
"product_id": "BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6176",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-10-31T01:00:56.408048+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408762"
}
],
"notes": [
{
"category": "description",
"text": "Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in Scrapy\u0027s brotli decompression implementation allows remote attackers to trigger a denial of service by sending specially crafted brotli-compressed data. This can lead to excessive memory consumption and system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.src",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.src",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "RHBZ#2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"release_date": "2025-10-31T00:00:21.219000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T02:33:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.src",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.src",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2229"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.src",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.src",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.src",
"AppStream-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.x86_64",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"AppStream-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.src",
"BaseOS-9.6.0.Z.EUS:brotli-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:brotli-debugsource-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:brotli-devel-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:libbrotli-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:libbrotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:python3-brotli-0:1.0.9-7.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.i686",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.s390x",
"BaseOS-9.6.0.Z.EUS:python3-brotli-debuginfo-0:1.0.9-7.el9_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS"
}
]
}
RHSA-2026:2800
Vulnerability from csaf_redhat - Published: 2026-02-17 09:23 - Updated: 2026-02-18 19:45Summary
Red Hat Security Advisory: Red Hat Ceph Storage
Notes
Topic
A new version of Red Hat build of Ceph Storage has been released
Details
The Red Hat Storage Ceph container images are based on the latest ubi9 base image and Ceph 7.1.
This release updates to the latest version.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A new version of Red Hat build of Ceph Storage has been released",
"title": "Topic"
},
{
"category": "general",
"text": "The Red Hat Storage Ceph container images are based on the latest ubi9 base image and Ceph 7.1.\nThis release updates to the latest version.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2800",
"url": "https://access.redhat.com/errata/RHSA-2026:2800"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-31884",
"url": "https://access.redhat.com/security/cve/CVE-2024-31884"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14104",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6176",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-7783",
"url": "https://access.redhat.com/security/cve/CVE-2025-7783"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/",
"url": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2800.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Ceph Storage",
"tracking": {
"current_release_date": "2026-02-18T19:45:17+00:00",
"generator": {
"date": "2026-02-18T19:45:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2800",
"initial_release_date": "2026-02-17T09:23:04+00:00",
"revision_history": [
{
"date": "2026-02-17T09:23:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-17T09:23:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-18T19:45:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ceph Storage 7",
"product": {
"name": "Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ceph_storage:7::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ceph Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770708805"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770649398"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3Ac3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770650099"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3Acffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770649294"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-7-rhel9@sha256%3A485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632724"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3A02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770642181"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770708805"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3Ad7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770708805"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770649398"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3A70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770650099"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3A329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770649294"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-7-rhel9@sha256%3Ac22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632724"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3Ae14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770642181"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770708805"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770649398"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3A22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770650099"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3Aa57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770649294"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-7-rhel9@sha256%3Adf2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632724"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3A89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770642181"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64 as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x as a component of Red Hat Ceph Storage 7",
"product_id": "Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Martin Schobert"
]
}
],
"cve": "CVE-2024-31884",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2025-08-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2389907"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pybind: Improper use of Pybind",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-31884"
},
{
"category": "external",
"summary": "RHBZ#2389907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2389907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31884"
}
],
"release_date": "2026-01-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T09:23:04+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2800"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pybind: Improper use of Pybind"
},
{
"cve": "CVE-2025-6176",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-10-31T01:00:56.408048+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408762"
}
],
"notes": [
{
"category": "description",
"text": "Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in Scrapy\u0027s brotli decompression implementation allows remote attackers to trigger a denial of service by sending specially crafted brotli-compressed data. This can lead to excessive memory consumption and system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "RHBZ#2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"release_date": "2025-10-31T00:00:21.219000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T09:23:04+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2800"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS"
},
{
"cve": "CVE-2025-7783",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"discovery_date": "2025-07-18T17:00:43.396637+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2381959"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability related to predictable random number generation has been discovered in the form-data JavaScript library. The library utilizes Math.random() to determine boundary values for multipart form-encoded data.\n\nThis presents a security risk if an attacker can observe other values generated by Math.random() within the target application and simultaneously control at least one field of a request made using form-data. Under these conditions, the attacker could potentially predict or determine the boundary values. This predictability could be leveraged to bypass security controls, manipulate form data, or potentially lead to data integrity issues or other forms of exploitation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "form-data: Unsafe random function in form-data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw does not affect host systems. The impact of this vulnerability is limited to specific applications which integrate the `form-data` library. As a result the impact of this CVE is limited on RedHat systems.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-7783"
},
{
"category": "external",
"summary": "RHBZ#2381959",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2381959"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-7783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7783"
},
{
"category": "external",
"summary": "https://github.com/form-data/form-data/commit/3d1723080e6577a66f17f163ecd345a21d8d0fd0",
"url": "https://github.com/form-data/form-data/commit/3d1723080e6577a66f17f163ecd345a21d8d0fd0"
},
{
"category": "external",
"summary": "https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4",
"url": "https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4"
}
],
"release_date": "2025-07-18T16:34:44.889000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T09:23:04+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2800"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "form-data: Unsafe random function in form-data"
},
{
"cve": "CVE-2025-14104",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-12-05T14:16:36.004000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419369"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "RHBZ#2419369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104"
}
],
"release_date": "2025-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T09:23:04+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2800"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T09:23:04+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2800"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-17T09:23:04+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2800"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:014ca9e66e06e96ddba3dd24f9796dbd423a737b4251f3ee3707373c0dd8e5a9_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dd48448925ea6f01b931123341c64c9c36be26522ca2949a2582c503b4d9813_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:81c6a248c341927ff595c3bda38576f83aafc2bb5305e4fd82ec2d037a8a6795_arm64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/grafana-rhel9@sha256:d7e8d93331a4bab6da651c54e889d2276d7681f15fc8e6aeff4b1964463894ef_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:22b40eda7694aa76f9c327b90cfe9090f3afc49efe792b512557e7f85adbb5fc_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:70f461842375bb3f8a95d21f3bd24e656a256375e719c40e8dffbca2e1f477fc_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/keepalived-rhel9@sha256:c3aed3c0baf2a107ba6df0b25588b56a0f7ae18c9b8a9e71db725629f0a2d8cd_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:485411749726179fe5cd880e2cf308261b35150e4b356ddb7100f52e02b2e353_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:c22fa89f545b3a8ae37cddadbea46d5bb51b8178929a67254bd2a133f4c0f221_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-7-rhel9@sha256:df2032db9a082aa0d08adfc76a18d65548d2c2f14dedad0dc35bc0117aca42b8_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:0a162811f3d4d6c648c95896a2eb649836c459d62d1c2baf8fa617cac78453c4_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:13cf40d4e5330176358d8c9a726933d4ed814042ae31705dc43983dabf20c10a_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:38a810ddc53e87aa286db2db075fbc8095302f5a5dc019faeea5a6095c595b57_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:329dba4f10a52c84359451c09647cbf9978792ec9f7b72dea9f4162229d1b804_s390x",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:a57259020a57641ef473e2476cf80eb93c3e5399d99355b4a218f8a0bf6e2afb_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:cffa01568a8d3dbc3e497151721be43a628fb4e0e50a86fc9da24604c1206712_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:02e713e61e7f54be3a0d67ec9162bf540922a54a51c10c8574b3385227121956_amd64",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:89b4f2be86bcddb502502486bc6014113892a977d74d3ef9dd80a38e53dc7461_ppc64le",
"Red Hat Ceph Storage 7:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:e14ee8fdaed88f74a7027a4b427d64c7e7169725507b6f41b5504904acd39a41_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
}
]
}
RHSA-2026:2399
Vulnerability from csaf_redhat - Published: 2026-02-10 09:11 - Updated: 2026-02-17 18:23Summary
Red Hat Security Advisory: brotli security update
Notes
Topic
An update for brotli is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support and Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for brotli is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support and Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. \n\nSecurity Fix(es):\n\n* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2399",
"url": "https://access.redhat.com/errata/RHSA-2026:2399"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2399.json"
}
],
"title": "Red Hat Security Advisory: brotli security update",
"tracking": {
"current_release_date": "2026-02-17T18:23:22+00:00",
"generator": {
"date": "2026-02-17T18:23:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2399",
"initial_release_date": "2026-02-10T09:11:31+00:00",
"revision_history": [
{
"date": "2026-02-10T09:11:31+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-10T09:11:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-17T18:23:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus_long_life:8.4::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-devel-0:1.0.6-4.el8_4.i686",
"product": {
"name": "brotli-devel-0:1.0.6-4.el8_4.i686",
"product_id": "brotli-devel-0:1.0.6-4.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.6-4.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.6-4.el8_4.i686",
"product": {
"name": "brotli-debugsource-0:1.0.6-4.el8_4.i686",
"product_id": "brotli-debugsource-0:1.0.6-4.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.6-4.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"product": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"product_id": "brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.6-4.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"product_id": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.6-4.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-0:1.0.6-4.el8_4.i686",
"product": {
"name": "brotli-0:1.0.6-4.el8_4.i686",
"product_id": "brotli-0:1.0.6-4.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-4.el8_4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-devel-0:1.0.6-4.el8_4.x86_64",
"product": {
"name": "brotli-devel-0:1.0.6-4.el8_4.x86_64",
"product_id": "brotli-devel-0:1.0.6-4.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.6-4.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.6-4.el8_4.x86_64",
"product": {
"name": "python3-brotli-0:1.0.6-4.el8_4.x86_64",
"product_id": "python3-brotli-0:1.0.6-4.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.6-4.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"product": {
"name": "brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"product_id": "brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.6-4.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"product": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"product_id": "brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.6-4.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"product_id": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.6-4.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-0:1.0.6-4.el8_4.x86_64",
"product": {
"name": "brotli-0:1.0.6-4.el8_4.x86_64",
"product_id": "brotli-0:1.0.6-4.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-4.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.6-4.el8_4.src",
"product": {
"name": "brotli-0:1.0.6-4.el8_4.src",
"product_id": "brotli-0:1.0.6-4.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-4.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.i686"
},
"product_reference": "brotli-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_4.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.src"
},
"product_reference": "brotli-0:1.0.6-4.el8_4.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "brotli-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.i686"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.i686"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.i686"
},
"product_reference": "brotli-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_4.src as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.src"
},
"product_reference": "brotli-0:1.0.6-4.el8_4.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "brotli-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.i686"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.i686"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python3-brotli-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.i686"
},
"product_reference": "brotli-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_4.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.src"
},
"product_reference": "brotli-0:1.0.6-4.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "brotli-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.i686"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.i686"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.i686"
},
"product_reference": "brotli-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.src"
},
"product_reference": "brotli-0:1.0.6-4.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "brotli-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.i686"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.i686"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-brotli-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6176",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-10-31T01:00:56.408048+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408762"
}
],
"notes": [
{
"category": "description",
"text": "Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in Scrapy\u0027s brotli decompression implementation allows remote attackers to trigger a denial of service by sending specially crafted brotli-compressed data. This can lead to excessive memory consumption and system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.src",
"AppStream-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-brotli-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.src",
"BaseOS-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-brotli-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "RHBZ#2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"release_date": "2025-10-31T00:00:21.219000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T09:11:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.src",
"AppStream-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-brotli-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.src",
"BaseOS-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-brotli-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2399"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.src",
"AppStream-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-brotli-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.src",
"BaseOS-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-brotli-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.src",
"AppStream-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-brotli-0:1.0.6-4.el8_4.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.src",
"BaseOS-8.4.0.Z.AUS:brotli-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:brotli-devel-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-brotli-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.AUS:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debuginfo-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-debugsource-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:brotli-devel-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-brotli-0:1.0.6-4.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-brotli-debuginfo-0:1.0.6-4.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS"
}
]
}
RHSA-2026:0845
Vulnerability from csaf_redhat - Published: 2026-01-20 12:13 - Updated: 2026-02-17 18:23Summary
Red Hat Security Advisory: brotli security update
Notes
Topic
An update for brotli is now available for Red Hat Enterprise Linux 10.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for brotli is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. \n\nSecurity Fix(es):\n\n* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:0845",
"url": "https://access.redhat.com/errata/RHSA-2026:0845"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_0845.json"
}
],
"title": "Red Hat Security Advisory: brotli security update",
"tracking": {
"current_release_date": "2026-02-17T18:23:09+00:00",
"generator": {
"date": "2026-02-17T18:23:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:0845",
"initial_release_date": "2026-01-20T12:13:35+00:00",
"revision_history": [
{
"date": "2026-01-20T12:13:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-01-20T12:13:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-17T18:23:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.1.0-7.el10_1.aarch64",
"product": {
"name": "brotli-0:1.1.0-7.el10_1.aarch64",
"product_id": "brotli-0:1.1.0-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.1.0-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.1.0-7.el10_1.aarch64",
"product": {
"name": "brotli-devel-0:1.1.0-7.el10_1.aarch64",
"product_id": "brotli-devel-0:1.1.0-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.1.0-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.1.0-7.el10_1.aarch64",
"product": {
"name": "python3-brotli-0:1.1.0-7.el10_1.aarch64",
"product_id": "python3-brotli-0:1.1.0-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.1.0-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.1.0-7.el10_1.aarch64",
"product": {
"name": "brotli-debugsource-0:1.1.0-7.el10_1.aarch64",
"product_id": "brotli-debugsource-0:1.1.0-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.1.0-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"product": {
"name": "brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"product_id": "brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.1.0-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"product": {
"name": "libbrotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"product_id": "libbrotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.1.0-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"product": {
"name": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"product_id": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.1.0-7.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.1.0-7.el10_1.aarch64",
"product": {
"name": "libbrotli-0:1.1.0-7.el10_1.aarch64",
"product_id": "libbrotli-0:1.1.0-7.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.1.0-7.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.1.0-7.el10_1.ppc64le",
"product": {
"name": "brotli-0:1.1.0-7.el10_1.ppc64le",
"product_id": "brotli-0:1.1.0-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.1.0-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.1.0-7.el10_1.ppc64le",
"product": {
"name": "brotli-devel-0:1.1.0-7.el10_1.ppc64le",
"product_id": "brotli-devel-0:1.1.0-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.1.0-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.1.0-7.el10_1.ppc64le",
"product": {
"name": "python3-brotli-0:1.1.0-7.el10_1.ppc64le",
"product_id": "python3-brotli-0:1.1.0-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.1.0-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.1.0-7.el10_1.ppc64le",
"product": {
"name": "brotli-debugsource-0:1.1.0-7.el10_1.ppc64le",
"product_id": "brotli-debugsource-0:1.1.0-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.1.0-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"product": {
"name": "brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"product_id": "brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.1.0-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"product": {
"name": "libbrotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"product_id": "libbrotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.1.0-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"product": {
"name": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"product_id": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.1.0-7.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.1.0-7.el10_1.ppc64le",
"product": {
"name": "libbrotli-0:1.1.0-7.el10_1.ppc64le",
"product_id": "libbrotli-0:1.1.0-7.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.1.0-7.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.1.0-7.el10_1.s390x",
"product": {
"name": "brotli-0:1.1.0-7.el10_1.s390x",
"product_id": "brotli-0:1.1.0-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.1.0-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.1.0-7.el10_1.s390x",
"product": {
"name": "brotli-devel-0:1.1.0-7.el10_1.s390x",
"product_id": "brotli-devel-0:1.1.0-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.1.0-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.1.0-7.el10_1.s390x",
"product": {
"name": "python3-brotli-0:1.1.0-7.el10_1.s390x",
"product_id": "python3-brotli-0:1.1.0-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.1.0-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.1.0-7.el10_1.s390x",
"product": {
"name": "brotli-debugsource-0:1.1.0-7.el10_1.s390x",
"product_id": "brotli-debugsource-0:1.1.0-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.1.0-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"product": {
"name": "brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"product_id": "brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.1.0-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"product": {
"name": "libbrotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"product_id": "libbrotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.1.0-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"product": {
"name": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"product_id": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.1.0-7.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.1.0-7.el10_1.s390x",
"product": {
"name": "libbrotli-0:1.1.0-7.el10_1.s390x",
"product_id": "libbrotli-0:1.1.0-7.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.1.0-7.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.1.0-7.el10_1.x86_64",
"product": {
"name": "brotli-0:1.1.0-7.el10_1.x86_64",
"product_id": "brotli-0:1.1.0-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.1.0-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.1.0-7.el10_1.x86_64",
"product": {
"name": "brotli-devel-0:1.1.0-7.el10_1.x86_64",
"product_id": "brotli-devel-0:1.1.0-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.1.0-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.1.0-7.el10_1.x86_64",
"product": {
"name": "python3-brotli-0:1.1.0-7.el10_1.x86_64",
"product_id": "python3-brotli-0:1.1.0-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.1.0-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.1.0-7.el10_1.x86_64",
"product": {
"name": "brotli-debugsource-0:1.1.0-7.el10_1.x86_64",
"product_id": "brotli-debugsource-0:1.1.0-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.1.0-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"product": {
"name": "brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"product_id": "brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.1.0-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"product": {
"name": "libbrotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"product_id": "libbrotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.1.0-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"product": {
"name": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"product_id": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.1.0-7.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.1.0-7.el10_1.x86_64",
"product": {
"name": "libbrotli-0:1.1.0-7.el10_1.x86_64",
"product_id": "libbrotli-0:1.1.0-7.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.1.0-7.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.1.0-7.el10_1.src",
"product": {
"name": "brotli-0:1.1.0-7.el10_1.src",
"product_id": "brotli-0:1.1.0-7.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.1.0-7.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.aarch64"
},
"product_reference": "brotli-0:1.1.0-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.ppc64le"
},
"product_reference": "brotli-0:1.1.0-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.s390x"
},
"product_reference": "brotli-0:1.1.0-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-7.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.src"
},
"product_reference": "brotli-0:1.1.0-7.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.x86_64"
},
"product_reference": "brotli-0:1.1.0-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.1.0-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.aarch64"
},
"product_reference": "brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.1.0-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.s390x"
},
"product_reference": "brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.1.0-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.1.0-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.aarch64"
},
"product_reference": "brotli-debugsource-0:1.1.0-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.1.0-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.1.0-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.1.0-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.s390x"
},
"product_reference": "brotli-debugsource-0:1.1.0-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.1.0-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.x86_64"
},
"product_reference": "brotli-debugsource-0:1.1.0-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.1.0-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.aarch64"
},
"product_reference": "brotli-devel-0:1.1.0-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.1.0-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.ppc64le"
},
"product_reference": "brotli-devel-0:1.1.0-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.1.0-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.s390x"
},
"product_reference": "brotli-devel-0:1.1.0-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.1.0-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.x86_64"
},
"product_reference": "brotli-devel-0:1.1.0-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.1.0-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.aarch64"
},
"product_reference": "libbrotli-0:1.1.0-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.1.0-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.ppc64le"
},
"product_reference": "libbrotli-0:1.1.0-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.1.0-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.s390x"
},
"product_reference": "libbrotli-0:1.1.0-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.1.0-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.x86_64"
},
"product_reference": "libbrotli-0:1.1.0-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.1.0-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.aarch64"
},
"product_reference": "libbrotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.1.0-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.ppc64le"
},
"product_reference": "libbrotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.1.0-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.s390x"
},
"product_reference": "libbrotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.1.0-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.x86_64"
},
"product_reference": "libbrotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.1.0-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.aarch64"
},
"product_reference": "python3-brotli-0:1.1.0-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.1.0-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.ppc64le"
},
"product_reference": "python3-brotli-0:1.1.0-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.1.0-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.s390x"
},
"product_reference": "python3-brotli-0:1.1.0-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.1.0-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.x86_64"
},
"product_reference": "python3-brotli-0:1.1.0-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.aarch64"
},
"product_reference": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.s390x"
},
"product_reference": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.aarch64"
},
"product_reference": "brotli-0:1.1.0-7.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.ppc64le"
},
"product_reference": "brotli-0:1.1.0-7.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-7.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.s390x"
},
"product_reference": "brotli-0:1.1.0-7.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-7.el10_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.src"
},
"product_reference": "brotli-0:1.1.0-7.el10_1.src",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.1.0-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.x86_64"
},
"product_reference": "brotli-0:1.1.0-7.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.1.0-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.aarch64"
},
"product_reference": "brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.1.0-7.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.s390x"
},
"product_reference": "brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.1.0-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.1.0-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.aarch64"
},
"product_reference": "brotli-debugsource-0:1.1.0-7.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.1.0-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.1.0-7.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.1.0-7.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.s390x"
},
"product_reference": "brotli-debugsource-0:1.1.0-7.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.1.0-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.x86_64"
},
"product_reference": "brotli-debugsource-0:1.1.0-7.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.1.0-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.aarch64"
},
"product_reference": "brotli-devel-0:1.1.0-7.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.1.0-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.ppc64le"
},
"product_reference": "brotli-devel-0:1.1.0-7.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.1.0-7.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.s390x"
},
"product_reference": "brotli-devel-0:1.1.0-7.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.1.0-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.x86_64"
},
"product_reference": "brotli-devel-0:1.1.0-7.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.1.0-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.aarch64"
},
"product_reference": "libbrotli-0:1.1.0-7.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.1.0-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.ppc64le"
},
"product_reference": "libbrotli-0:1.1.0-7.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.1.0-7.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.s390x"
},
"product_reference": "libbrotli-0:1.1.0-7.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.1.0-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.x86_64"
},
"product_reference": "libbrotli-0:1.1.0-7.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.1.0-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.aarch64"
},
"product_reference": "libbrotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.1.0-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.ppc64le"
},
"product_reference": "libbrotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.1.0-7.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.s390x"
},
"product_reference": "libbrotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.1.0-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.x86_64"
},
"product_reference": "libbrotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.1.0-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.aarch64"
},
"product_reference": "python3-brotli-0:1.1.0-7.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.1.0-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.ppc64le"
},
"product_reference": "python3-brotli-0:1.1.0-7.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.1.0-7.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.s390x"
},
"product_reference": "python3-brotli-0:1.1.0-7.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.1.0-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.x86_64"
},
"product_reference": "python3-brotli-0:1.1.0-7.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.aarch64"
},
"product_reference": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.s390x"
},
"product_reference": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6176",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-10-31T01:00:56.408048+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408762"
}
],
"notes": [
{
"category": "description",
"text": "Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in Scrapy\u0027s brotli decompression implementation allows remote attackers to trigger a denial of service by sending specially crafted brotli-compressed data. This can lead to excessive memory consumption and system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.src",
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.src",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "RHBZ#2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"release_date": "2025-10-31T00:00:21.219000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-01-20T12:13:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.src",
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.src",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:0845"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.src",
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.src",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.src",
"AppStream-10.1.Z:brotli-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:libbrotli-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.x86_64",
"AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"AppStream-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.src",
"BaseOS-10.1.Z:brotli-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:brotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:brotli-debugsource-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:brotli-devel-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:libbrotli-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:libbrotli-debuginfo-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:python3-brotli-0:1.1.0-7.el10_1.x86_64",
"BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.aarch64",
"BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.s390x",
"BaseOS-10.1.Z:python3-brotli-debuginfo-0:1.1.0-7.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS"
}
]
}
RHSA-2026:2389
Vulnerability from csaf_redhat - Published: 2026-02-10 07:49 - Updated: 2026-02-17 18:23Summary
Red Hat Security Advisory: brotli security update
Notes
Topic
An update for brotli is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for brotli is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. \n\nSecurity Fix(es):\n\n* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2389",
"url": "https://access.redhat.com/errata/RHSA-2026:2389"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2389.json"
}
],
"title": "Red Hat Security Advisory: brotli security update",
"tracking": {
"current_release_date": "2026-02-17T18:23:22+00:00",
"generator": {
"date": "2026-02-17T18:23:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2389",
"initial_release_date": "2026-02-10T07:49:36+00:00",
"revision_history": [
{
"date": "2026-02-10T07:49:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-10T07:49:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-17T18:23:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-devel-0:1.0.6-4.el8_10.aarch64",
"product": {
"name": "brotli-devel-0:1.0.6-4.el8_10.aarch64",
"product_id": "brotli-devel-0:1.0.6-4.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.6-4.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.6-4.el8_10.aarch64",
"product": {
"name": "python3-brotli-0:1.0.6-4.el8_10.aarch64",
"product_id": "python3-brotli-0:1.0.6-4.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.6-4.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.6-4.el8_10.aarch64",
"product": {
"name": "brotli-debugsource-0:1.0.6-4.el8_10.aarch64",
"product_id": "brotli-debugsource-0:1.0.6-4.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.6-4.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"product": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"product_id": "brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.6-4.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"product_id": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.6-4.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-0:1.0.6-4.el8_10.aarch64",
"product": {
"name": "brotli-0:1.0.6-4.el8_10.aarch64",
"product_id": "brotli-0:1.0.6-4.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-devel-0:1.0.6-4.el8_10.ppc64le",
"product": {
"name": "brotli-devel-0:1.0.6-4.el8_10.ppc64le",
"product_id": "brotli-devel-0:1.0.6-4.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.6-4.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.6-4.el8_10.ppc64le",
"product": {
"name": "python3-brotli-0:1.0.6-4.el8_10.ppc64le",
"product_id": "python3-brotli-0:1.0.6-4.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.6-4.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.6-4.el8_10.ppc64le",
"product": {
"name": "brotli-debugsource-0:1.0.6-4.el8_10.ppc64le",
"product_id": "brotli-debugsource-0:1.0.6-4.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.6-4.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"product": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"product_id": "brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.6-4.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"product_id": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.6-4.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-0:1.0.6-4.el8_10.ppc64le",
"product": {
"name": "brotli-0:1.0.6-4.el8_10.ppc64le",
"product_id": "brotli-0:1.0.6-4.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-devel-0:1.0.6-4.el8_10.i686",
"product": {
"name": "brotli-devel-0:1.0.6-4.el8_10.i686",
"product_id": "brotli-devel-0:1.0.6-4.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.6-4.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.6-4.el8_10.i686",
"product": {
"name": "brotli-debugsource-0:1.0.6-4.el8_10.i686",
"product_id": "brotli-debugsource-0:1.0.6-4.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.6-4.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"product": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"product_id": "brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.6-4.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"product_id": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.6-4.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-0:1.0.6-4.el8_10.i686",
"product": {
"name": "brotli-0:1.0.6-4.el8_10.i686",
"product_id": "brotli-0:1.0.6-4.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-devel-0:1.0.6-4.el8_10.x86_64",
"product": {
"name": "brotli-devel-0:1.0.6-4.el8_10.x86_64",
"product_id": "brotli-devel-0:1.0.6-4.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.6-4.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.6-4.el8_10.x86_64",
"product": {
"name": "python3-brotli-0:1.0.6-4.el8_10.x86_64",
"product_id": "python3-brotli-0:1.0.6-4.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.6-4.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.6-4.el8_10.x86_64",
"product": {
"name": "brotli-debugsource-0:1.0.6-4.el8_10.x86_64",
"product_id": "brotli-debugsource-0:1.0.6-4.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.6-4.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"product": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"product_id": "brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.6-4.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"product_id": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.6-4.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-0:1.0.6-4.el8_10.x86_64",
"product": {
"name": "brotli-0:1.0.6-4.el8_10.x86_64",
"product_id": "brotli-0:1.0.6-4.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-devel-0:1.0.6-4.el8_10.s390x",
"product": {
"name": "brotli-devel-0:1.0.6-4.el8_10.s390x",
"product_id": "brotli-devel-0:1.0.6-4.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.6-4.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.6-4.el8_10.s390x",
"product": {
"name": "python3-brotli-0:1.0.6-4.el8_10.s390x",
"product_id": "python3-brotli-0:1.0.6-4.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.6-4.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.6-4.el8_10.s390x",
"product": {
"name": "brotli-debugsource-0:1.0.6-4.el8_10.s390x",
"product_id": "brotli-debugsource-0:1.0.6-4.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.6-4.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"product": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"product_id": "brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.6-4.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"product_id": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.6-4.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-0:1.0.6-4.el8_10.s390x",
"product": {
"name": "brotli-0:1.0.6-4.el8_10.s390x",
"product_id": "brotli-0:1.0.6-4.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.6-4.el8_10.src",
"product": {
"name": "brotli-0:1.0.6-4.el8_10.src",
"product_id": "brotli-0:1.0.6-4.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.aarch64"
},
"product_reference": "brotli-0:1.0.6-4.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.i686"
},
"product_reference": "brotli-0:1.0.6-4.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.ppc64le"
},
"product_reference": "brotli-0:1.0.6-4.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.s390x"
},
"product_reference": "brotli-0:1.0.6-4.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.src"
},
"product_reference": "brotli-0:1.0.6-4.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.x86_64"
},
"product_reference": "brotli-0:1.0.6-4.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.aarch64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.s390x"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.aarch64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.i686"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.s390x"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.aarch64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.i686"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.ppc64le"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.s390x"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.x86_64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.aarch64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.ppc64le"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.s390x"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.x86_64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.aarch64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.s390x"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.aarch64"
},
"product_reference": "brotli-0:1.0.6-4.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.i686"
},
"product_reference": "brotli-0:1.0.6-4.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.ppc64le"
},
"product_reference": "brotli-0:1.0.6-4.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.s390x"
},
"product_reference": "brotli-0:1.0.6-4.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.src"
},
"product_reference": "brotli-0:1.0.6-4.el8_10.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.6-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.x86_64"
},
"product_reference": "brotli-0:1.0.6-4.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.aarch64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.s390x"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.6-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.aarch64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.i686"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.s390x"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.6-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.6-4.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.aarch64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.i686"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.ppc64le"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.s390x"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.6-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.x86_64"
},
"product_reference": "brotli-devel-0:1.0.6-4.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.aarch64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.ppc64le"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.s390x"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.6-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.x86_64"
},
"product_reference": "python3-brotli-0:1.0.6-4.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.aarch64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.s390x"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6176",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-10-31T01:00:56.408048+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408762"
}
],
"notes": [
{
"category": "description",
"text": "Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in Scrapy\u0027s brotli decompression implementation allows remote attackers to trigger a denial of service by sending specially crafted brotli-compressed data. This can lead to excessive memory consumption and system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "RHBZ#2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"release_date": "2025-10-31T00:00:21.219000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-10T07:49:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2389"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debuginfo-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-debugsource-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:brotli-devel-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-0:1.0.6-4.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-brotli-debuginfo-0:1.0.6-4.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS"
}
]
}
RHSA-2026:2737
Vulnerability from csaf_redhat - Published: 2026-02-16 12:56 - Updated: 2026-02-19 00:06Summary
Red Hat Security Advisory: Red Hat Ceph Storage
Notes
Topic
A new version of Red Hat build of Ceph Storage has been released
Details
The Red Hat Storage Ceph container images are based on the latest ubi9 base image and Ceph 8.1.
This release updates to the latest version.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A new version of Red Hat build of Ceph Storage has been released",
"title": "Topic"
},
{
"category": "general",
"text": "The Red Hat Storage Ceph container images are based on the latest ubi9 base image and Ceph 8.1.\nThis release updates to the latest version.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2737",
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2019-10790",
"url": "https://access.redhat.com/security/cve/CVE-2019-10790"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-23358",
"url": "https://access.redhat.com/security/cve/CVE-2021-23358"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2022-34749",
"url": "https://access.redhat.com/security/cve/CVE-2022-34749"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-31884",
"url": "https://access.redhat.com/security/cve/CVE-2024-31884"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-51744",
"url": "https://access.redhat.com/security/cve/CVE-2024-51744"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-55565",
"url": "https://access.redhat.com/security/cve/CVE-2024-55565"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-12816",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14104",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-26791",
"url": "https://access.redhat.com/security/cve/CVE-2025-26791"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47907",
"url": "https://access.redhat.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58183",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6176",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66031",
"url": "https://access.redhat.com/security/cve/CVE-2025-66031"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-68429",
"url": "https://access.redhat.com/security/cve/CVE-2025-68429"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-7783",
"url": "https://access.redhat.com/security/cve/CVE-2025-7783"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/",
"url": "https://docs.redhat.com/en/documentation/red_hat_ceph_storage/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2737.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Ceph Storage",
"tracking": {
"current_release_date": "2026-02-19T00:06:42+00:00",
"generator": {
"date": "2026-02-19T00:06:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2737",
"initial_release_date": "2026-02-16T12:56:05+00:00",
"revision_history": [
{
"date": "2026-02-16T12:56:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-16T12:56:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-19T00:06:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Ceph Storage 8",
"product": {
"name": "Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ceph_storage:8::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Ceph Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3Ab219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770630607"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770631713"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3Af00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632172"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3A224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770631941"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3Abf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770630907"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3A064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4?arch=amd64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632233"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770630607"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3Ae856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770631713"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3A5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632172"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3Afe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770631941"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3A2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770630907"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3Af31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11?arch=arm64\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632233"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3A1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770630607"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3Aedb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770631713"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3Aad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632172"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3A91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770631941"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3Ac571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770630907"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3A3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6?arch=s390x\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632233"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"product_id": "registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/grafana-rhel9@sha256%3Aeca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770630607"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-haproxy-rhel9@sha256%3A60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770631713"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"product_id": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/keepalived-rhel9@sha256%3A72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632172"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-promtail-rhel9@sha256%3Ad287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770631941"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"product_id": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rhceph-8-rhel9@sha256%3Aecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770630907"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"product": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"product_id": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/snmp-notifier-rhel9@sha256%3Ad19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph\u0026tag=1770632233"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64"
},
"product_reference": "registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64"
},
"product_reference": "registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64 as a component of Red Hat Ceph Storage 8",
"product_id": "Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
},
"product_reference": "registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64",
"relates_to_product_reference": "Red Hat Ceph Storage 8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-10790",
"discovery_date": "2025-08-20T22:37:38.151000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2389970"
}
],
"notes": [
{
"category": "description",
"text": "taffydb npm module, vulnerable in all versions up to and including 2.7.3, allows attackers to forge adding additional properties into user-input processed by taffy which can allow access to any data items in the DB. taffy sets an internal index for each data item in its DB. However, it is found that the internal index can be forged by adding additional properties into user-input. If index is found in the query, taffyDB will ignore other query conditions and directly return the indexed data item. Moreover, the internal index is in an easily-guessable format (e.g., T000002R000001). As such, attackers can use this vulnerability to access any data items in the DB.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "taffy: taffydb: Internal Property Tampering",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10790"
},
{
"category": "external",
"summary": "RHBZ#2389970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2389970"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10790",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10790"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10790",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10790"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-JS-TAFFYDB-2992450",
"url": "https://security.snyk.io/vuln/SNYK-JS-TAFFYDB-2992450"
},
{
"category": "external",
"summary": "https://snyk.io/vuln/SNYK-JS-TAFFY-546521",
"url": "https://snyk.io/vuln/SNYK-JS-TAFFY-546521"
},
{
"category": "external",
"summary": "https://www.usenix.org/system/files/sec21-xiao.pdf",
"url": "https://www.usenix.org/system/files/sec21-xiao.pdf"
}
],
"release_date": "2020-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "taffy: taffydb: Internal Property Tampering"
},
{
"cve": "CVE-2021-23358",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944286"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nodejs-underscore. Arbitrary code execution via the template function is possible, particularly when a variable property is passed as an argument as it is not sanitized. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-underscore: Arbitrary code execution via the template function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Whilst the OpenShift Container Platform (OCP) openshift4/ose-grafana and openshift3/grafana as well as console, grc-ui and search-ui containers for Red Hat Advanced Management for Kubernetes (RHACM) include the vulnerable underscore library, the access to it is protected by OpenShift OAuth. Additionally this library is used in openshift4/ose-grafana container only in Grafana End-to-End Test package. Therefore the impact by this flaw is reduced to Low and the affected OCP components are marked as \"will not fix\" at this time and to Moderate for the affected RHACM components. This might be fixed in a future release.\n\nRed Hat Enterprise Virtualization includes the vulnerable underscore library, however it is not parsing any untrusted data, therefore impact is reduced to Low.\n\nBelow Red Hat products include the underscore dependency, but it is not used by the product and hence this issue has been rated as having a security impact of Low.\n\n* Red Hat Quay\n* Red Hat Gluster Storage 3\n* Red Hat OpenShift Container Storage 4\n* Red Hat Ceph Storage 3 and 4",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-23358"
},
{
"category": "external",
"summary": "RHBZ#1944286",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944286"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-23358",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23358"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23358",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23358"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs-underscore: Arbitrary code execution via the template function"
},
{
"cve": "CVE-2022-34749",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2022-07-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2112230"
}
],
"notes": [
{
"category": "description",
"text": "A regular expression denial of service (ReDoS) flaw was found in the asteris emphasis regular expression implementation in Mistune. By sending specially-crafted regex input, a remote attacker could invoke a catastrophic backtrack, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mistune: catastrophic backtracking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-34749"
},
{
"category": "external",
"summary": "RHBZ#2112230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112230"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-34749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34749"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34749",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34749"
},
{
"category": "external",
"summary": "https://github.com/lepture/mistune/commit/a6d43215132fe4f3d93f8d7e90ba83b16a0838b2",
"url": "https://github.com/lepture/mistune/commit/a6d43215132fe4f3d93f8d7e90ba83b16a0838b2"
}
],
"release_date": "2022-07-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mistune: catastrophic backtracking"
},
{
"acknowledgments": [
{
"names": [
"Martin Schobert"
]
}
],
"cve": "CVE-2024-31884",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2025-08-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2389907"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pybind: Improper use of Pybind",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-31884"
},
{
"category": "external",
"summary": "RHBZ#2389907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2389907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31884"
}
],
"release_date": "2026-01-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pybind: Improper use of Pybind"
},
{
"cve": "CVE-2024-51744",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"discovery_date": "2024-11-04T22:01:08.655905+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323735"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang-jwt package. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they can miss the embedded `jwt.ErrTokenSignatureInvalid`, and thus, potentially accept invalid tokens.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang-jwt: Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations in golang-jwt",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-51744"
},
{
"category": "external",
"summary": "RHBZ#2323735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323735"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-51744",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-51744"
},
{
"category": "external",
"summary": "https://github.com/golang-jwt/jwt/commit/7b1c1c00a171c6c79bbdb40e4ce7d197060c1c2c",
"url": "https://github.com/golang-jwt/jwt/commit/7b1c1c00a171c6c79bbdb40e4ce7d197060c1c2c"
},
{
"category": "external",
"summary": "https://github.com/golang-jwt/jwt/security/advisories/GHSA-29wx-vh33-7x7r",
"url": "https://github.com/golang-jwt/jwt/security/advisories/GHSA-29wx-vh33-7x7r"
}
],
"release_date": "2024-11-04T21:47:12.170000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "golang-jwt: Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations in golang-jwt"
},
{
"cve": "CVE-2024-55565",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2024-12-09T02:00:45.255738+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331063"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nanoid. Affected versions of nanoid mishandles non-integer values. When nanoid is called with a fractional value, there were a number of undesirable effects:\n\n- In browser and non-secure, the code infinite loops on while (size--)\n- In node, the value of poolOffset becomes fractional, causing calls to nanoid to return zeroes until the pool is next filled: when i is initialized to poolOffset, pool[i] \u0026 63 -\u003e undefined \u0026 63 -\u003e 0\n- If the first call in node is a fractional argument, the initial buffer allocation fails with an error\n\nThe highest impact of this issue system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nanoid: nanoid mishandles non-integer values",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-55565"
},
{
"category": "external",
"summary": "RHBZ#2331063",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331063"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-55565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55565"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-55565",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-55565"
},
{
"category": "external",
"summary": "https://github.com/ai/nanoid/compare/3.3.7...3.3.8",
"url": "https://github.com/ai/nanoid/compare/3.3.7...3.3.8"
},
{
"category": "external",
"summary": "https://github.com/ai/nanoid/pull/510",
"url": "https://github.com/ai/nanoid/pull/510"
},
{
"category": "external",
"summary": "https://github.com/ai/nanoid/releases/tag/5.0.9",
"url": "https://github.com/ai/nanoid/releases/tag/5.0.9"
}
],
"release_date": "2024-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "nanoid: nanoid mishandles non-integer values"
},
{
"cve": "CVE-2025-6176",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-10-31T01:00:56.408048+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408762"
}
],
"notes": [
{
"category": "description",
"text": "Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in Scrapy\u0027s brotli decompression implementation allows remote attackers to trigger a denial of service by sending specially crafted brotli-compressed data. This can lead to excessive memory consumption and system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "RHBZ#2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"release_date": "2025-10-31T00:00:21.219000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS"
},
{
"cve": "CVE-2025-7783",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"discovery_date": "2025-07-18T17:00:43.396637+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2381959"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability related to predictable random number generation has been discovered in the form-data JavaScript library. The library utilizes Math.random() to determine boundary values for multipart form-encoded data.\n\nThis presents a security risk if an attacker can observe other values generated by Math.random() within the target application and simultaneously control at least one field of a request made using form-data. Under these conditions, the attacker could potentially predict or determine the boundary values. This predictability could be leveraged to bypass security controls, manipulate form data, or potentially lead to data integrity issues or other forms of exploitation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "form-data: Unsafe random function in form-data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw does not affect host systems. The impact of this vulnerability is limited to specific applications which integrate the `form-data` library. As a result the impact of this CVE is limited on RedHat systems.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-7783"
},
{
"category": "external",
"summary": "RHBZ#2381959",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2381959"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-7783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7783"
},
{
"category": "external",
"summary": "https://github.com/form-data/form-data/commit/3d1723080e6577a66f17f163ecd345a21d8d0fd0",
"url": "https://github.com/form-data/form-data/commit/3d1723080e6577a66f17f163ecd345a21d8d0fd0"
},
{
"category": "external",
"summary": "https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4",
"url": "https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4"
}
],
"release_date": "2025-07-18T16:34:44.889000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "form-data: Unsafe random function in form-data"
},
{
"cve": "CVE-2025-12816",
"cwe": {
"id": "CWE-179",
"name": "Incorrect Behavior Order: Early Validation"
},
"discovery_date": "2025-11-25T20:01:05.875196+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2417097"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in node-forge. This vulnerability allows unauthenticated attackers to bypass downstream cryptographic verifications and security decisions via crafting ASN.1 (Abstract Syntax Notation One) structures to desynchronize schema validations, yielding a semantic divergence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products due to an interpretation conflict in the node-forge library. An unauthenticated attacker could exploit this flaw by crafting malicious ASN.1 structures, leading to a bypass of cryptographic verifications and security decisions in affected applications. This impacts various Red Hat products that utilize node-forge for cryptographic operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "RHBZ#2417097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417097"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge",
"url": "https://github.com/digitalbazaar/forge"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/pull/1124",
"url": "https://github.com/digitalbazaar/forge/pull/1124"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/521113",
"url": "https://kb.cert.org/vuls/id/521113"
},
{
"category": "external",
"summary": "https://www.npmjs.com/package/node-forge",
"url": "https://www.npmjs.com/package/node-forge"
}
],
"release_date": "2025-11-25T19:15:50.243000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications"
},
{
"cve": "CVE-2025-14104",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-12-05T14:16:36.004000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419369"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14104"
},
{
"category": "external",
"summary": "RHBZ#2419369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419369"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14104"
}
],
"release_date": "2025-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames"
},
{
"cve": "CVE-2025-26791",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2025-02-14T09:00:45.578144+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2345695"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in DOMPurify. This vulnerability allows attackers to execute mutation-based Cross-site scripting (mXSS) via an incorrect template literal regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dompurify: Mutation XSS in DOMPurify Due to Improper Template Literal Handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-26791"
},
{
"category": "external",
"summary": "RHBZ#2345695",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345695"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26791"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-26791",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-26791"
},
{
"category": "external",
"summary": "https://ensy.zip/posts/dompurify-323-bypass/",
"url": "https://ensy.zip/posts/dompurify-323-bypass/"
},
{
"category": "external",
"summary": "https://github.com/cure53/DOMPurify/commit/d18ffcb554e0001748865da03ac75dd7829f0f02",
"url": "https://github.com/cure53/DOMPurify/commit/d18ffcb554e0001748865da03ac75dd7829f0f02"
},
{
"category": "external",
"summary": "https://github.com/cure53/DOMPurify/releases/tag/3.2.4",
"url": "https://github.com/cure53/DOMPurify/releases/tag/3.2.4"
},
{
"category": "external",
"summary": "https://nsysean.github.io/posts/dompurify-323-bypass/",
"url": "https://nsysean.github.io/posts/dompurify-323-bypass/"
}
],
"release_date": "2025-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dompurify: Mutation XSS in DOMPurify Due to Improper Template Literal Handling"
},
{
"cve": "CVE-2025-47907",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2025-08-07T16:01:06.247481+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2387083"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in database/sql. Concurrent queries can produce unexpected results when a query is cancelled during a Scan method call on returned Rows, creating a race condition. This vulnerability allows an attacker who can initiate and cancel queries to trigger this condition, possibly leading to inconsistent data being returned to the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "database/sql: Postgres Scan Race Condition",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability marked as Moderate severity issues rather than Important. The os/exec LookPath flaw requires a misconfigured PATH to be exploitable, and the database/sql race condition primarily impacts applications that cancel queries while running multiple queries concurrently. Both can cause unexpected behavior, but the exploitation scope is limited and unlikely to result in direct compromise in most typical deployments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "RHBZ#2387083",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387083"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47907",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47907"
},
{
"category": "external",
"summary": "https://go.dev/cl/693735",
"url": "https://go.dev/cl/693735"
},
{
"category": "external",
"summary": "https://go.dev/issue/74831",
"url": "https://go.dev/issue/74831"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x5MKroML2yM",
"url": "https://groups.google.com/g/golang-announce/c/x5MKroML2yM"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-3849",
"url": "https://pkg.go.dev/vuln/GO-2025-3849"
}
],
"release_date": "2025-08-07T15:25:30.704000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "database/sql: Postgres Scan Race Condition"
},
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-58183",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-29T23:01:50.573951+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2407258"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to be able to process a specially crafted GNU tar pax 1.0 archive with the application using the archive/tar package. Additionally, this issue can cause the Go application to allocate a large amount of memory, eventually leading to an out-of-memory condition and resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "RHBZ#2407258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2407258"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://go.dev/cl/709861",
"url": "https://go.dev/cl/709861"
},
{
"category": "external",
"summary": "https://go.dev/issue/75677",
"url": "https://go.dev/issue/75677"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI",
"url": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4014",
"url": "https://pkg.go.dev/vuln/GO-2025-4014"
}
],
"release_date": "2025-10-29T22:10:14.376000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map"
},
{
"cve": "CVE-2025-66031",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-11-26T23:01:36.363253+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2417397"
}
],
"notes": [
{
"category": "description",
"text": "Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge ASN.1 Unbounded Recursion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66031"
},
{
"category": "external",
"summary": "RHBZ#2417397",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417397"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66031"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66031",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66031"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/commit/260425c6167a38aae038697132483b5517b26451",
"url": "https://github.com/digitalbazaar/forge/commit/260425c6167a38aae038697132483b5517b26451"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-554w-wpv2-vw27",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-554w-wpv2-vw27"
}
],
"release_date": "2025-11-26T22:23:26.013000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "node-forge: node-forge ASN.1 Unbounded Recursion"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2025-68429",
"cwe": {
"id": "CWE-538",
"name": "Insertion of Sensitive Information into Externally-Accessible File or Directory"
},
"discovery_date": "2025-12-17T23:03:29.948214+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2423460"
}
],
"notes": [
{
"category": "description",
"text": "Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook\u2019s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle\u2019s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than `.env` files. Storybook runtime environments (i.e. `storybook dev`) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook\u2014on both their local machines and CI environment\u2014to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via `.env` files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with `STORYBOOK_` or use the `env` property in Storybook\u2019s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Storybook: Storybook: Information disclosure via unexpected bundling of environment variables",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat as it can lead to the unintended exposure of sensitive environment variables. This occurs when a Storybook project is built using the `storybook build` command in a directory containing a `.env` file, and the resulting bundle is subsequently published to a web-accessible location. Storybook instances built without `.env` files or run in development mode (`storybook dev`) are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"known_not_affected": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-68429"
},
{
"category": "external",
"summary": "RHBZ#2423460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-68429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68429"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-68429",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68429"
},
{
"category": "external",
"summary": "https://github.com/storybookjs/storybook/security/advisories/GHSA-8452-54wp-rmv6",
"url": "https://github.com/storybookjs/storybook/security/advisories/GHSA-8452-54wp-rmv6"
},
{
"category": "external",
"summary": "https://storybook.js.org/blog/security-advisory",
"url": "https://storybook.js.org/blog/security-advisory"
}
],
"release_date": "2025-12-17T22:26:55.732000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-16T12:56:05+00:00",
"details": "The container images provided by this update can be downloaded from the\nRed Hat container registry at registry.redhat.io using the \"podman pull\" command.",
"product_ids": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:1dc2620596822eb28fb997bc51ad2ecb352011e63f4c54fb650bc3e4c8009c4e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:25ba51881b0dbabd2911ec309a1aa881cfb8075605a6d50dac63751482a55d62_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:b219c4478e43d68d1a3f2bb9aa0ec16cd30d11587d48ab5952ac09b03771c396_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/grafana-rhel9@sha256:eca201d07c2a36e80e38d331ac5daf176ae85b6f36884bb6cb22df27dc14eb63_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:5eb26c2ee619ea24d5fa836b1d34e18fcaf83ce5202f9cb5e57adc4c1860cedb_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:72e2a67c8f707d8c4c0657b2d69e47e3d426db857e8270330fcff59f7145f362_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:ad1d4a09a47b2770be8feffed6cf0b8da2305b0472515ebbb08ebda65d608e79_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/keepalived-rhel9@sha256:f00d96629947fa7b290d75ed751bc3e6a514cee8545307f1685d05662b3257cb_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:2325f237ab329cb3f1d3db4da40ed19f68d6daa2a5902c71be3f0d3cfcadd503_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:bf39728adabe9f4c9b50eed0af81d3524ed655718a0e3f86fa1f77aa6ccdb4d2_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:c571ca5630d65b34f08776d61f6be269a5e819dd870a99530993adc50c19e43e_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-8-rhel9@sha256:ecd314ed5a994812d976dbccf0d3c4db54fadf5c1cba46d1fa0b2f0a1fd0e921_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:60f49f5b8bf2a681ee8fc8b5cd1351f70c1fe9a0052b4ec4806f6f5e996c14ad_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:9ed8cbcf7d72efc99c619dbebb4f0dc548ac574d76f321efd5bc077ab35051c7_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:e856a58e6720d1fb05988d53f5b5868f10407551f8dfffd8b27e30d683b79920_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-haproxy-rhel9@sha256:edb5ff30f3984733c7c778e06a05fedf562790e9b2baf7f91f23b84e3db1228f_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:224d90fd4efbf139fa0a8f37705af8556c89128d9fe9911de8a421877e920746_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:91606367539bd6d36ad256a49a14f94eb534de2ad28e894d18288d97612fda7c_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:d287d7b9594acfc6c2a49e9734c4699a7f641a24c136af2a984ce91ea2c3bdb1_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/rhceph-promtail-rhel9@sha256:fe7eac5ba8577d0f36408c3f8be773c4e95ef57ded868a47cf80f669c51dca98_arm64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:064b805df36b0ce427e9aa04177bce9334b1f691f2d3f15e469b9b969ce34bd4_amd64",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:3a2e53f6ac97df7e08ea40464916bbb50edb2bbfd5623b1037a04a8cd7f80ee6_s390x",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:d19e8224bbbc5b8a5c4c4ce7e3f7406d93c7e8de87de638f20cd806bcb8049c0_ppc64le",
"Red Hat Ceph Storage 8:registry.redhat.io/rhceph/snmp-notifier-rhel9@sha256:f31fe74f9dfb4a181358d4513573690c60fee2b3658472269239189374636a11_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Storybook: Storybook: Information disclosure via unexpected bundling of environment variables"
}
]
}
RHSA-2026:2226
Vulnerability from csaf_redhat - Published: 2026-02-09 01:39 - Updated: 2026-02-17 18:23Summary
Red Hat Security Advisory: brotli security update
Notes
Topic
An update for brotli is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for brotli is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. \n\nSecurity Fix(es):\n\n* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2226",
"url": "https://access.redhat.com/errata/RHSA-2026:2226"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2226.json"
}
],
"title": "Red Hat Security Advisory: brotli security update",
"tracking": {
"current_release_date": "2026-02-17T18:23:20+00:00",
"generator": {
"date": "2026-02-17T18:23:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2226",
"initial_release_date": "2026-02-09T01:39:26+00:00",
"revision_history": [
{
"date": "2026-02-09T01:39:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-09T01:39:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-17T18:23:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:9.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-6.el9_0.1.src",
"product": {
"name": "brotli-0:1.0.9-6.el9_0.1.src",
"product_id": "brotli-0:1.0.9-6.el9_0.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-6.el9_0.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-6.el9_0.1.aarch64",
"product": {
"name": "libbrotli-0:1.0.9-6.el9_0.1.aarch64",
"product_id": "libbrotli-0:1.0.9-6.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-6.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.aarch64",
"product": {
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.aarch64",
"product_id": "brotli-debugsource-0:1.0.9-6.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-6.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"product": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"product_id": "brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-6.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"product_id": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-6.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"product_id": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-6.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-0:1.0.9-6.el9_0.1.aarch64",
"product": {
"name": "brotli-0:1.0.9-6.el9_0.1.aarch64",
"product_id": "brotli-0:1.0.9-6.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-6.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-6.el9_0.1.aarch64",
"product": {
"name": "brotli-devel-0:1.0.9-6.el9_0.1.aarch64",
"product_id": "brotli-devel-0:1.0.9-6.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-6.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-6.el9_0.1.aarch64",
"product": {
"name": "python3-brotli-0:1.0.9-6.el9_0.1.aarch64",
"product_id": "python3-brotli-0:1.0.9-6.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-6.el9_0.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-6.el9_0.1.ppc64le",
"product": {
"name": "libbrotli-0:1.0.9-6.el9_0.1.ppc64le",
"product_id": "libbrotli-0:1.0.9-6.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-6.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.ppc64le",
"product": {
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.ppc64le",
"product_id": "brotli-debugsource-0:1.0.9-6.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-6.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"product": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"product_id": "brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-6.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"product_id": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-6.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"product_id": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-6.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-0:1.0.9-6.el9_0.1.ppc64le",
"product": {
"name": "brotli-0:1.0.9-6.el9_0.1.ppc64le",
"product_id": "brotli-0:1.0.9-6.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-6.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-6.el9_0.1.ppc64le",
"product": {
"name": "brotli-devel-0:1.0.9-6.el9_0.1.ppc64le",
"product_id": "brotli-devel-0:1.0.9-6.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-6.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-6.el9_0.1.ppc64le",
"product": {
"name": "python3-brotli-0:1.0.9-6.el9_0.1.ppc64le",
"product_id": "python3-brotli-0:1.0.9-6.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-6.el9_0.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-6.el9_0.1.i686",
"product": {
"name": "libbrotli-0:1.0.9-6.el9_0.1.i686",
"product_id": "libbrotli-0:1.0.9-6.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-6.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.i686",
"product": {
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.i686",
"product_id": "brotli-debugsource-0:1.0.9-6.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-6.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"product": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"product_id": "brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-6.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"product_id": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-6.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"product_id": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-6.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-0:1.0.9-6.el9_0.1.i686",
"product": {
"name": "brotli-0:1.0.9-6.el9_0.1.i686",
"product_id": "brotli-0:1.0.9-6.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-6.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-6.el9_0.1.i686",
"product": {
"name": "brotli-devel-0:1.0.9-6.el9_0.1.i686",
"product_id": "brotli-devel-0:1.0.9-6.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-6.el9_0.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-6.el9_0.1.x86_64",
"product": {
"name": "libbrotli-0:1.0.9-6.el9_0.1.x86_64",
"product_id": "libbrotli-0:1.0.9-6.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-6.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.x86_64",
"product": {
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.x86_64",
"product_id": "brotli-debugsource-0:1.0.9-6.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-6.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"product": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"product_id": "brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-6.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"product_id": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-6.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"product_id": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-6.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-0:1.0.9-6.el9_0.1.x86_64",
"product": {
"name": "brotli-0:1.0.9-6.el9_0.1.x86_64",
"product_id": "brotli-0:1.0.9-6.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-6.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-6.el9_0.1.x86_64",
"product": {
"name": "brotli-devel-0:1.0.9-6.el9_0.1.x86_64",
"product_id": "brotli-devel-0:1.0.9-6.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-6.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-6.el9_0.1.x86_64",
"product": {
"name": "python3-brotli-0:1.0.9-6.el9_0.1.x86_64",
"product_id": "python3-brotli-0:1.0.9-6.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-6.el9_0.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-6.el9_0.1.s390x",
"product": {
"name": "libbrotli-0:1.0.9-6.el9_0.1.s390x",
"product_id": "libbrotli-0:1.0.9-6.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-6.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.s390x",
"product": {
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.s390x",
"product_id": "brotli-debugsource-0:1.0.9-6.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-6.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"product": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"product_id": "brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-6.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"product_id": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-6.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"product_id": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-6.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-0:1.0.9-6.el9_0.1.s390x",
"product": {
"name": "brotli-0:1.0.9-6.el9_0.1.s390x",
"product_id": "brotli-0:1.0.9-6.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-6.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-6.el9_0.1.s390x",
"product": {
"name": "brotli-devel-0:1.0.9-6.el9_0.1.s390x",
"product_id": "brotli-devel-0:1.0.9-6.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-6.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-6.el9_0.1.s390x",
"product": {
"name": "python3-brotli-0:1.0.9-6.el9_0.1.s390x",
"product_id": "python3-brotli-0:1.0.9-6.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-6.el9_0.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.aarch64"
},
"product_reference": "brotli-0:1.0.9-6.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.i686"
},
"product_reference": "brotli-0:1.0.9-6.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.ppc64le"
},
"product_reference": "brotli-0:1.0.9-6.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.s390x"
},
"product_reference": "brotli-0:1.0.9-6.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_0.1.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.src"
},
"product_reference": "brotli-0:1.0.9-6.el9_0.1.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.x86_64"
},
"product_reference": "brotli-0:1.0.9-6.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.aarch64"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.i686"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.s390x"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.aarch64"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.i686"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.ppc64le"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.s390x"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.x86_64"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.aarch64"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.i686"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.ppc64le"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.s390x"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.x86_64"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.i686"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.s390x"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.aarch64"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.ppc64le"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.s390x"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.x86_64"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.aarch64"
},
"product_reference": "brotli-0:1.0.9-6.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.i686"
},
"product_reference": "brotli-0:1.0.9-6.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.ppc64le"
},
"product_reference": "brotli-0:1.0.9-6.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.s390x"
},
"product_reference": "brotli-0:1.0.9-6.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_0.1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.src"
},
"product_reference": "brotli-0:1.0.9-6.el9_0.1.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-6.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.x86_64"
},
"product_reference": "brotli-0:1.0.9-6.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.aarch64"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.i686"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.s390x"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-6.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.9-6.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.aarch64"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.i686"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.ppc64le"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.s390x"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-6.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.x86_64"
},
"product_reference": "brotli-devel-0:1.0.9-6.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.aarch64"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.i686"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.ppc64le"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.s390x"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-6.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.x86_64"
},
"product_reference": "libbrotli-0:1.0.9-6.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.i686"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.s390x"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.aarch64"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.ppc64le"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.s390x"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-6.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.x86_64"
},
"product_reference": "python3-brotli-0:1.0.9-6.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6176",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-10-31T01:00:56.408048+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408762"
}
],
"notes": [
{
"category": "description",
"text": "Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in Scrapy\u0027s brotli decompression implementation allows remote attackers to trigger a denial of service by sending specially crafted brotli-compressed data. This can lead to excessive memory consumption and system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.src",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "RHBZ#2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"release_date": "2025-10-31T00:00:21.219000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-09T01:39:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.src",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2226"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.src",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.src",
"AppStream-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.x86_64",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"AppStream-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.src",
"BaseOS-9.0.0.Z.E4S:brotli-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:brotli-debugsource-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:brotli-devel-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libbrotli-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:libbrotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:python3-brotli-0:1.0.9-6.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.i686",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.s390x",
"BaseOS-9.0.0.Z.E4S:python3-brotli-debuginfo-0:1.0.9-6.el9_0.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS"
}
]
}
RHSA-2026:2042
Vulnerability from csaf_redhat - Published: 2026-02-05 09:50 - Updated: 2026-02-17 18:23Summary
Red Hat Security Advisory: brotli security update
Notes
Topic
An update for brotli is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for brotli is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. \n\nSecurity Fix(es):\n\n* Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2042",
"url": "https://access.redhat.com/errata/RHSA-2026:2042"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2042.json"
}
],
"title": "Red Hat Security Advisory: brotli security update",
"tracking": {
"current_release_date": "2026-02-17T18:23:16+00:00",
"generator": {
"date": "2026-02-17T18:23:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2042",
"initial_release_date": "2026-02-05T09:50:39+00:00",
"revision_history": [
{
"date": "2026-02-05T09:50:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-05T09:50:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-17T18:23:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-9.el9_7.s390x",
"product": {
"name": "brotli-0:1.0.9-9.el9_7.s390x",
"product_id": "brotli-0:1.0.9-9.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-9.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-9.el9_7.s390x",
"product": {
"name": "brotli-devel-0:1.0.9-9.el9_7.s390x",
"product_id": "brotli-devel-0:1.0.9-9.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-9.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-9.el9_7.s390x",
"product": {
"name": "python3-brotli-0:1.0.9-9.el9_7.s390x",
"product_id": "python3-brotli-0:1.0.9-9.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-9.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-9.el9_7.s390x",
"product": {
"name": "brotli-debugsource-0:1.0.9-9.el9_7.s390x",
"product_id": "brotli-debugsource-0:1.0.9-9.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-9.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"product": {
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"product_id": "brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-9.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"product_id": "libbrotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-9.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"product_id": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-9.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-9.el9_7.s390x",
"product": {
"name": "libbrotli-0:1.0.9-9.el9_7.s390x",
"product_id": "libbrotli-0:1.0.9-9.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-9.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-9.el9_7.aarch64",
"product": {
"name": "brotli-0:1.0.9-9.el9_7.aarch64",
"product_id": "brotli-0:1.0.9-9.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-9.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-9.el9_7.aarch64",
"product": {
"name": "brotli-devel-0:1.0.9-9.el9_7.aarch64",
"product_id": "brotli-devel-0:1.0.9-9.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-9.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-9.el9_7.aarch64",
"product": {
"name": "python3-brotli-0:1.0.9-9.el9_7.aarch64",
"product_id": "python3-brotli-0:1.0.9-9.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-9.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-9.el9_7.aarch64",
"product": {
"name": "brotli-debugsource-0:1.0.9-9.el9_7.aarch64",
"product_id": "brotli-debugsource-0:1.0.9-9.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-9.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"product": {
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"product_id": "brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-9.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"product_id": "libbrotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-9.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"product_id": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-9.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-9.el9_7.aarch64",
"product": {
"name": "libbrotli-0:1.0.9-9.el9_7.aarch64",
"product_id": "libbrotli-0:1.0.9-9.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-9.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-9.el9_7.ppc64le",
"product": {
"name": "brotli-0:1.0.9-9.el9_7.ppc64le",
"product_id": "brotli-0:1.0.9-9.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-9.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-9.el9_7.ppc64le",
"product": {
"name": "brotli-devel-0:1.0.9-9.el9_7.ppc64le",
"product_id": "brotli-devel-0:1.0.9-9.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-9.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-9.el9_7.ppc64le",
"product": {
"name": "python3-brotli-0:1.0.9-9.el9_7.ppc64le",
"product_id": "python3-brotli-0:1.0.9-9.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-9.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-9.el9_7.ppc64le",
"product": {
"name": "brotli-debugsource-0:1.0.9-9.el9_7.ppc64le",
"product_id": "brotli-debugsource-0:1.0.9-9.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-9.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"product": {
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"product_id": "brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-9.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"product_id": "libbrotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-9.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"product_id": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-9.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-9.el9_7.ppc64le",
"product": {
"name": "libbrotli-0:1.0.9-9.el9_7.ppc64le",
"product_id": "libbrotli-0:1.0.9-9.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-9.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-9.el9_7.i686",
"product": {
"name": "brotli-0:1.0.9-9.el9_7.i686",
"product_id": "brotli-0:1.0.9-9.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-9.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-9.el9_7.i686",
"product": {
"name": "brotli-devel-0:1.0.9-9.el9_7.i686",
"product_id": "brotli-devel-0:1.0.9-9.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-9.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-9.el9_7.i686",
"product": {
"name": "brotli-debugsource-0:1.0.9-9.el9_7.i686",
"product_id": "brotli-debugsource-0:1.0.9-9.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-9.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"product": {
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"product_id": "brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-9.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.i686",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.i686",
"product_id": "libbrotli-debuginfo-0:1.0.9-9.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-9.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"product_id": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-9.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-9.el9_7.i686",
"product": {
"name": "libbrotli-0:1.0.9-9.el9_7.i686",
"product_id": "libbrotli-0:1.0.9-9.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-9.el9_7?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-9.el9_7.x86_64",
"product": {
"name": "brotli-0:1.0.9-9.el9_7.x86_64",
"product_id": "brotli-0:1.0.9-9.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-9.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-devel-0:1.0.9-9.el9_7.x86_64",
"product": {
"name": "brotli-devel-0:1.0.9-9.el9_7.x86_64",
"product_id": "brotli-devel-0:1.0.9-9.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-devel@1.0.9-9.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-0:1.0.9-9.el9_7.x86_64",
"product": {
"name": "python3-brotli-0:1.0.9-9.el9_7.x86_64",
"product_id": "python3-brotli-0:1.0.9-9.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli@1.0.9-9.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debugsource-0:1.0.9-9.el9_7.x86_64",
"product": {
"name": "brotli-debugsource-0:1.0.9-9.el9_7.x86_64",
"product_id": "brotli-debugsource-0:1.0.9-9.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debugsource@1.0.9-9.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"product": {
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"product_id": "brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli-debuginfo@1.0.9-9.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"product": {
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"product_id": "libbrotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli-debuginfo@1.0.9-9.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"product": {
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"product_id": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-brotli-debuginfo@1.0.9-9.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libbrotli-0:1.0.9-9.el9_7.x86_64",
"product": {
"name": "libbrotli-0:1.0.9-9.el9_7.x86_64",
"product_id": "libbrotli-0:1.0.9-9.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libbrotli@1.0.9-9.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "brotli-0:1.0.9-9.el9_7.src",
"product": {
"name": "brotli-0:1.0.9-9.el9_7.src",
"product_id": "brotli-0:1.0.9-9.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/brotli@1.0.9-9.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-9.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.aarch64"
},
"product_reference": "brotli-0:1.0.9-9.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-9.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.i686"
},
"product_reference": "brotli-0:1.0.9-9.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-9.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.ppc64le"
},
"product_reference": "brotli-0:1.0.9-9.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-9.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.s390x"
},
"product_reference": "brotli-0:1.0.9-9.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-9.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.src"
},
"product_reference": "brotli-0:1.0.9-9.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-9.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.x86_64"
},
"product_reference": "brotli-0:1.0.9-9.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.aarch64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.s390x"
},
"product_reference": "brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-9.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.aarch64"
},
"product_reference": "brotli-debugsource-0:1.0.9-9.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-9.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.i686"
},
"product_reference": "brotli-debugsource-0:1.0.9-9.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-9.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.0.9-9.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-9.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.s390x"
},
"product_reference": "brotli-debugsource-0:1.0.9-9.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-9.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.9-9.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-9.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.aarch64"
},
"product_reference": "brotli-devel-0:1.0.9-9.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-9.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.i686"
},
"product_reference": "brotli-devel-0:1.0.9-9.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-9.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.ppc64le"
},
"product_reference": "brotli-devel-0:1.0.9-9.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-9.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.s390x"
},
"product_reference": "brotli-devel-0:1.0.9-9.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-9.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.x86_64"
},
"product_reference": "brotli-devel-0:1.0.9-9.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-9.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.aarch64"
},
"product_reference": "libbrotli-0:1.0.9-9.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-9.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.i686"
},
"product_reference": "libbrotli-0:1.0.9-9.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-9.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.ppc64le"
},
"product_reference": "libbrotli-0:1.0.9-9.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-9.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.s390x"
},
"product_reference": "libbrotli-0:1.0.9-9.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-9.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.x86_64"
},
"product_reference": "libbrotli-0:1.0.9-9.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.aarch64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.i686"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-9.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.ppc64le"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.s390x"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.x86_64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-9.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.aarch64"
},
"product_reference": "python3-brotli-0:1.0.9-9.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-9.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.ppc64le"
},
"product_reference": "python3-brotli-0:1.0.9-9.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-9.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.s390x"
},
"product_reference": "python3-brotli-0:1.0.9-9.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-9.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.x86_64"
},
"product_reference": "python3-brotli-0:1.0.9-9.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.aarch64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.s390x"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-9.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.aarch64"
},
"product_reference": "brotli-0:1.0.9-9.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-9.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.i686"
},
"product_reference": "brotli-0:1.0.9-9.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-9.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.ppc64le"
},
"product_reference": "brotli-0:1.0.9-9.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-9.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.s390x"
},
"product_reference": "brotli-0:1.0.9-9.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-9.el9_7.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.src"
},
"product_reference": "brotli-0:1.0.9-9.el9_7.src",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-0:1.0.9-9.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.x86_64"
},
"product_reference": "brotli-0:1.0.9-9.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.aarch64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.i686"
},
"product_reference": "brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le"
},
"product_reference": "brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.s390x"
},
"product_reference": "brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debuginfo-0:1.0.9-9.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.x86_64"
},
"product_reference": "brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-9.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.aarch64"
},
"product_reference": "brotli-debugsource-0:1.0.9-9.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-9.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.i686"
},
"product_reference": "brotli-debugsource-0:1.0.9-9.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-9.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.ppc64le"
},
"product_reference": "brotli-debugsource-0:1.0.9-9.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-9.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.s390x"
},
"product_reference": "brotli-debugsource-0:1.0.9-9.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-debugsource-0:1.0.9-9.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.x86_64"
},
"product_reference": "brotli-debugsource-0:1.0.9-9.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-9.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.aarch64"
},
"product_reference": "brotli-devel-0:1.0.9-9.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-9.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.i686"
},
"product_reference": "brotli-devel-0:1.0.9-9.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-9.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.ppc64le"
},
"product_reference": "brotli-devel-0:1.0.9-9.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-9.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.s390x"
},
"product_reference": "brotli-devel-0:1.0.9-9.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "brotli-devel-0:1.0.9-9.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.x86_64"
},
"product_reference": "brotli-devel-0:1.0.9-9.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-9.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.aarch64"
},
"product_reference": "libbrotli-0:1.0.9-9.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-9.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.i686"
},
"product_reference": "libbrotli-0:1.0.9-9.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-9.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.ppc64le"
},
"product_reference": "libbrotli-0:1.0.9-9.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-9.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.s390x"
},
"product_reference": "libbrotli-0:1.0.9-9.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-0:1.0.9-9.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.x86_64"
},
"product_reference": "libbrotli-0:1.0.9-9.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.aarch64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.i686"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-9.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.ppc64le"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.s390x"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libbrotli-debuginfo-0:1.0.9-9.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.x86_64"
},
"product_reference": "libbrotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-9.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.aarch64"
},
"product_reference": "python3-brotli-0:1.0.9-9.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-9.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.ppc64le"
},
"product_reference": "python3-brotli-0:1.0.9-9.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-9.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.s390x"
},
"product_reference": "python3-brotli-0:1.0.9-9.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-0:1.0.9-9.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.x86_64"
},
"product_reference": "python3-brotli-0:1.0.9-9.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.aarch64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.i686"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.s390x"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.x86_64"
},
"product_reference": "python3-brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"relates_to_product_reference": "BaseOS-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6176",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-10-31T01:00:56.408048+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2408762"
}
],
"notes": [
{
"category": "description",
"text": "Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products. The flaw in Scrapy\u0027s brotli decompression implementation allows remote attackers to trigger a denial of service by sending specially crafted brotli-compressed data. This can lead to excessive memory consumption and system instability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.src",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.src",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "RHBZ#2408762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2408762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176"
},
{
"category": "external",
"summary": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"release_date": "2025-10-31T00:00:21.219000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-05T09:50:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.src",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.src",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2042"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.src",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.src",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.src",
"AppStream-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.src",
"BaseOS-9.7.0.Z.MAIN:brotli-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:brotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:brotli-debugsource-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:brotli-devel-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libbrotli-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:libbrotli-debuginfo-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-0:1.0.9-9.el9_7.x86_64",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.aarch64",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.i686",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.ppc64le",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.s390x",
"BaseOS-9.7.0.Z.MAIN:python3-brotli-debuginfo-0:1.0.9-9.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS"
}
]
}
FKIE_CVE-2025-6176
Vulnerability from fkie_nvd - Published: 2025-10-31 00:15 - Updated: 2025-11-04 15:41
Severity ?
Summary
Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression."
}
],
"id": "CVE-2025-6176",
"lastModified": "2025-11-04T15:41:56.843",
"metrics": {
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security@huntr.dev",
"type": "Secondary"
}
]
},
"published": "2025-10-31T00:15:37.333",
"references": [
{
"source": "security@huntr.dev",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"sourceIdentifier": "security@huntr.dev",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "security@huntr.dev",
"type": "Secondary"
}
]
}
OPENSUSE-SU-2025:15731-1
Vulnerability from csaf_opensuse - Published: 2025-11-12 00:00 - Updated: 2025-11-12 00:00Summary
python311-Brotli-1.2.0-1.1 on GA media
Notes
Title of the patch
python311-Brotli-1.2.0-1.1 on GA media
Description of the patch
These are all security issues fixed in the python311-Brotli-1.2.0-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15731
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python311-Brotli-1.2.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python311-Brotli-1.2.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15731",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15731-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6176/"
}
],
"title": "python311-Brotli-1.2.0-1.1 on GA media",
"tracking": {
"current_release_date": "2025-11-12T00:00:00Z",
"generator": {
"date": "2025-11-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15731-1",
"initial_release_date": "2025-11-12T00:00:00Z",
"revision_history": [
{
"date": "2025-11-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python311-Brotli-1.2.0-1.1.aarch64",
"product": {
"name": "python311-Brotli-1.2.0-1.1.aarch64",
"product_id": "python311-Brotli-1.2.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-Brotli-1.2.0-1.1.aarch64",
"product": {
"name": "python312-Brotli-1.2.0-1.1.aarch64",
"product_id": "python312-Brotli-1.2.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python313-Brotli-1.2.0-1.1.aarch64",
"product": {
"name": "python313-Brotli-1.2.0-1.1.aarch64",
"product_id": "python313-Brotli-1.2.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-Brotli-1.2.0-1.1.ppc64le",
"product": {
"name": "python311-Brotli-1.2.0-1.1.ppc64le",
"product_id": "python311-Brotli-1.2.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-Brotli-1.2.0-1.1.ppc64le",
"product": {
"name": "python312-Brotli-1.2.0-1.1.ppc64le",
"product_id": "python312-Brotli-1.2.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python313-Brotli-1.2.0-1.1.ppc64le",
"product": {
"name": "python313-Brotli-1.2.0-1.1.ppc64le",
"product_id": "python313-Brotli-1.2.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-Brotli-1.2.0-1.1.s390x",
"product": {
"name": "python311-Brotli-1.2.0-1.1.s390x",
"product_id": "python311-Brotli-1.2.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-Brotli-1.2.0-1.1.s390x",
"product": {
"name": "python312-Brotli-1.2.0-1.1.s390x",
"product_id": "python312-Brotli-1.2.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python313-Brotli-1.2.0-1.1.s390x",
"product": {
"name": "python313-Brotli-1.2.0-1.1.s390x",
"product_id": "python313-Brotli-1.2.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-Brotli-1.2.0-1.1.x86_64",
"product": {
"name": "python311-Brotli-1.2.0-1.1.x86_64",
"product_id": "python311-Brotli-1.2.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-Brotli-1.2.0-1.1.x86_64",
"product": {
"name": "python312-Brotli-1.2.0-1.1.x86_64",
"product_id": "python312-Brotli-1.2.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python313-Brotli-1.2.0-1.1.x86_64",
"product": {
"name": "python313-Brotli-1.2.0-1.1.x86_64",
"product_id": "python313-Brotli-1.2.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-Brotli-1.2.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-Brotli-1.2.0-1.1.aarch64"
},
"product_reference": "python311-Brotli-1.2.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-Brotli-1.2.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-Brotli-1.2.0-1.1.ppc64le"
},
"product_reference": "python311-Brotli-1.2.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-Brotli-1.2.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-Brotli-1.2.0-1.1.s390x"
},
"product_reference": "python311-Brotli-1.2.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-Brotli-1.2.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-Brotli-1.2.0-1.1.x86_64"
},
"product_reference": "python311-Brotli-1.2.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-Brotli-1.2.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-Brotli-1.2.0-1.1.aarch64"
},
"product_reference": "python312-Brotli-1.2.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-Brotli-1.2.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-Brotli-1.2.0-1.1.ppc64le"
},
"product_reference": "python312-Brotli-1.2.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-Brotli-1.2.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-Brotli-1.2.0-1.1.s390x"
},
"product_reference": "python312-Brotli-1.2.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-Brotli-1.2.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-Brotli-1.2.0-1.1.x86_64"
},
"product_reference": "python312-Brotli-1.2.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-Brotli-1.2.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-Brotli-1.2.0-1.1.aarch64"
},
"product_reference": "python313-Brotli-1.2.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-Brotli-1.2.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-Brotli-1.2.0-1.1.ppc64le"
},
"product_reference": "python313-Brotli-1.2.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-Brotli-1.2.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-Brotli-1.2.0-1.1.s390x"
},
"product_reference": "python313-Brotli-1.2.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-Brotli-1.2.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-Brotli-1.2.0-1.1.x86_64"
},
"product_reference": "python313-Brotli-1.2.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6176"
}
],
"notes": [
{
"category": "general",
"text": "Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-Brotli-1.2.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-Brotli-1.2.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Brotli-1.2.0-1.1.s390x",
"openSUSE Tumbleweed:python311-Brotli-1.2.0-1.1.x86_64",
"openSUSE Tumbleweed:python312-Brotli-1.2.0-1.1.aarch64",
"openSUSE Tumbleweed:python312-Brotli-1.2.0-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Brotli-1.2.0-1.1.s390x",
"openSUSE Tumbleweed:python312-Brotli-1.2.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-Brotli-1.2.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-Brotli-1.2.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Brotli-1.2.0-1.1.s390x",
"openSUSE Tumbleweed:python313-Brotli-1.2.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6176",
"url": "https://www.suse.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "SUSE Bug 1252945 for CVE-2025-6176",
"url": "https://bugzilla.suse.com/1252945"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-Brotli-1.2.0-1.1.aarch64",
"openSUSE Tumbleweed:python311-Brotli-1.2.0-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Brotli-1.2.0-1.1.s390x",
"openSUSE Tumbleweed:python311-Brotli-1.2.0-1.1.x86_64",
"openSUSE Tumbleweed:python312-Brotli-1.2.0-1.1.aarch64",
"openSUSE Tumbleweed:python312-Brotli-1.2.0-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Brotli-1.2.0-1.1.s390x",
"openSUSE Tumbleweed:python312-Brotli-1.2.0-1.1.x86_64",
"openSUSE Tumbleweed:python313-Brotli-1.2.0-1.1.aarch64",
"openSUSE Tumbleweed:python313-Brotli-1.2.0-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Brotli-1.2.0-1.1.s390x",
"openSUSE Tumbleweed:python313-Brotli-1.2.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-6176"
}
]
}
OPENSUSE-SU-2025:15732-1
Vulnerability from csaf_opensuse - Published: 2025-11-12 00:00 - Updated: 2025-11-12 00:00Summary
python-Scrapy-doc-2.13.3-2.1 on GA media
Notes
Title of the patch
python-Scrapy-doc-2.13.3-2.1 on GA media
Description of the patch
These are all security issues fixed in the python-Scrapy-doc-2.13.3-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15732
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python-Scrapy-doc-2.13.3-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python-Scrapy-doc-2.13.3-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15732",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15732-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6176/"
}
],
"title": "python-Scrapy-doc-2.13.3-2.1 on GA media",
"tracking": {
"current_release_date": "2025-11-12T00:00:00Z",
"generator": {
"date": "2025-11-12T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15732-1",
"initial_release_date": "2025-11-12T00:00:00Z",
"revision_history": [
{
"date": "2025-11-12T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python-Scrapy-doc-2.13.3-2.1.aarch64",
"product": {
"name": "python-Scrapy-doc-2.13.3-2.1.aarch64",
"product_id": "python-Scrapy-doc-2.13.3-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-Scrapy-2.13.3-2.1.aarch64",
"product": {
"name": "python311-Scrapy-2.13.3-2.1.aarch64",
"product_id": "python311-Scrapy-2.13.3-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-Scrapy-2.13.3-2.1.aarch64",
"product": {
"name": "python312-Scrapy-2.13.3-2.1.aarch64",
"product_id": "python312-Scrapy-2.13.3-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "python313-Scrapy-2.13.3-2.1.aarch64",
"product": {
"name": "python313-Scrapy-2.13.3-2.1.aarch64",
"product_id": "python313-Scrapy-2.13.3-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-Scrapy-doc-2.13.3-2.1.ppc64le",
"product": {
"name": "python-Scrapy-doc-2.13.3-2.1.ppc64le",
"product_id": "python-Scrapy-doc-2.13.3-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-Scrapy-2.13.3-2.1.ppc64le",
"product": {
"name": "python311-Scrapy-2.13.3-2.1.ppc64le",
"product_id": "python311-Scrapy-2.13.3-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-Scrapy-2.13.3-2.1.ppc64le",
"product": {
"name": "python312-Scrapy-2.13.3-2.1.ppc64le",
"product_id": "python312-Scrapy-2.13.3-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python313-Scrapy-2.13.3-2.1.ppc64le",
"product": {
"name": "python313-Scrapy-2.13.3-2.1.ppc64le",
"product_id": "python313-Scrapy-2.13.3-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python-Scrapy-doc-2.13.3-2.1.s390x",
"product": {
"name": "python-Scrapy-doc-2.13.3-2.1.s390x",
"product_id": "python-Scrapy-doc-2.13.3-2.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-Scrapy-2.13.3-2.1.s390x",
"product": {
"name": "python311-Scrapy-2.13.3-2.1.s390x",
"product_id": "python311-Scrapy-2.13.3-2.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-Scrapy-2.13.3-2.1.s390x",
"product": {
"name": "python312-Scrapy-2.13.3-2.1.s390x",
"product_id": "python312-Scrapy-2.13.3-2.1.s390x"
}
},
{
"category": "product_version",
"name": "python313-Scrapy-2.13.3-2.1.s390x",
"product": {
"name": "python313-Scrapy-2.13.3-2.1.s390x",
"product_id": "python313-Scrapy-2.13.3-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-Scrapy-doc-2.13.3-2.1.x86_64",
"product": {
"name": "python-Scrapy-doc-2.13.3-2.1.x86_64",
"product_id": "python-Scrapy-doc-2.13.3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-Scrapy-2.13.3-2.1.x86_64",
"product": {
"name": "python311-Scrapy-2.13.3-2.1.x86_64",
"product_id": "python311-Scrapy-2.13.3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-Scrapy-2.13.3-2.1.x86_64",
"product": {
"name": "python312-Scrapy-2.13.3-2.1.x86_64",
"product_id": "python312-Scrapy-2.13.3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "python313-Scrapy-2.13.3-2.1.x86_64",
"product": {
"name": "python313-Scrapy-2.13.3-2.1.x86_64",
"product_id": "python313-Scrapy-2.13.3-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-Scrapy-doc-2.13.3-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-Scrapy-doc-2.13.3-2.1.aarch64"
},
"product_reference": "python-Scrapy-doc-2.13.3-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-Scrapy-doc-2.13.3-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-Scrapy-doc-2.13.3-2.1.ppc64le"
},
"product_reference": "python-Scrapy-doc-2.13.3-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-Scrapy-doc-2.13.3-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-Scrapy-doc-2.13.3-2.1.s390x"
},
"product_reference": "python-Scrapy-doc-2.13.3-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-Scrapy-doc-2.13.3-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-Scrapy-doc-2.13.3-2.1.x86_64"
},
"product_reference": "python-Scrapy-doc-2.13.3-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-Scrapy-2.13.3-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-Scrapy-2.13.3-2.1.aarch64"
},
"product_reference": "python311-Scrapy-2.13.3-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-Scrapy-2.13.3-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-Scrapy-2.13.3-2.1.ppc64le"
},
"product_reference": "python311-Scrapy-2.13.3-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-Scrapy-2.13.3-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-Scrapy-2.13.3-2.1.s390x"
},
"product_reference": "python311-Scrapy-2.13.3-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-Scrapy-2.13.3-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-Scrapy-2.13.3-2.1.x86_64"
},
"product_reference": "python311-Scrapy-2.13.3-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-Scrapy-2.13.3-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-Scrapy-2.13.3-2.1.aarch64"
},
"product_reference": "python312-Scrapy-2.13.3-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-Scrapy-2.13.3-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-Scrapy-2.13.3-2.1.ppc64le"
},
"product_reference": "python312-Scrapy-2.13.3-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-Scrapy-2.13.3-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-Scrapy-2.13.3-2.1.s390x"
},
"product_reference": "python312-Scrapy-2.13.3-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-Scrapy-2.13.3-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-Scrapy-2.13.3-2.1.x86_64"
},
"product_reference": "python312-Scrapy-2.13.3-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-Scrapy-2.13.3-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-Scrapy-2.13.3-2.1.aarch64"
},
"product_reference": "python313-Scrapy-2.13.3-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-Scrapy-2.13.3-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-Scrapy-2.13.3-2.1.ppc64le"
},
"product_reference": "python313-Scrapy-2.13.3-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-Scrapy-2.13.3-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-Scrapy-2.13.3-2.1.s390x"
},
"product_reference": "python313-Scrapy-2.13.3-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-Scrapy-2.13.3-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-Scrapy-2.13.3-2.1.x86_64"
},
"product_reference": "python313-Scrapy-2.13.3-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6176"
}
],
"notes": [
{
"category": "general",
"text": "Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-Scrapy-doc-2.13.3-2.1.aarch64",
"openSUSE Tumbleweed:python-Scrapy-doc-2.13.3-2.1.ppc64le",
"openSUSE Tumbleweed:python-Scrapy-doc-2.13.3-2.1.s390x",
"openSUSE Tumbleweed:python-Scrapy-doc-2.13.3-2.1.x86_64",
"openSUSE Tumbleweed:python311-Scrapy-2.13.3-2.1.aarch64",
"openSUSE Tumbleweed:python311-Scrapy-2.13.3-2.1.ppc64le",
"openSUSE Tumbleweed:python311-Scrapy-2.13.3-2.1.s390x",
"openSUSE Tumbleweed:python311-Scrapy-2.13.3-2.1.x86_64",
"openSUSE Tumbleweed:python312-Scrapy-2.13.3-2.1.aarch64",
"openSUSE Tumbleweed:python312-Scrapy-2.13.3-2.1.ppc64le",
"openSUSE Tumbleweed:python312-Scrapy-2.13.3-2.1.s390x",
"openSUSE Tumbleweed:python312-Scrapy-2.13.3-2.1.x86_64",
"openSUSE Tumbleweed:python313-Scrapy-2.13.3-2.1.aarch64",
"openSUSE Tumbleweed:python313-Scrapy-2.13.3-2.1.ppc64le",
"openSUSE Tumbleweed:python313-Scrapy-2.13.3-2.1.s390x",
"openSUSE Tumbleweed:python313-Scrapy-2.13.3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6176",
"url": "https://www.suse.com/security/cve/CVE-2025-6176"
},
{
"category": "external",
"summary": "SUSE Bug 1252945 for CVE-2025-6176",
"url": "https://bugzilla.suse.com/1252945"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-Scrapy-doc-2.13.3-2.1.aarch64",
"openSUSE Tumbleweed:python-Scrapy-doc-2.13.3-2.1.ppc64le",
"openSUSE Tumbleweed:python-Scrapy-doc-2.13.3-2.1.s390x",
"openSUSE Tumbleweed:python-Scrapy-doc-2.13.3-2.1.x86_64",
"openSUSE Tumbleweed:python311-Scrapy-2.13.3-2.1.aarch64",
"openSUSE Tumbleweed:python311-Scrapy-2.13.3-2.1.ppc64le",
"openSUSE Tumbleweed:python311-Scrapy-2.13.3-2.1.s390x",
"openSUSE Tumbleweed:python311-Scrapy-2.13.3-2.1.x86_64",
"openSUSE Tumbleweed:python312-Scrapy-2.13.3-2.1.aarch64",
"openSUSE Tumbleweed:python312-Scrapy-2.13.3-2.1.ppc64le",
"openSUSE Tumbleweed:python312-Scrapy-2.13.3-2.1.s390x",
"openSUSE Tumbleweed:python312-Scrapy-2.13.3-2.1.x86_64",
"openSUSE Tumbleweed:python313-Scrapy-2.13.3-2.1.aarch64",
"openSUSE Tumbleweed:python313-Scrapy-2.13.3-2.1.ppc64le",
"openSUSE Tumbleweed:python313-Scrapy-2.13.3-2.1.s390x",
"openSUSE Tumbleweed:python313-Scrapy-2.13.3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-12T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-6176"
}
]
}
GHSA-2QFP-Q593-8484
Vulnerability from github – Published: 2025-10-31 00:30 – Updated: 2025-11-17 15:50
VLAI?
Summary
Scrapy is vulnerable to a denial of service (DoS) attack due to flaws in brotli decompression implementation
Details
Scrapy versions up to 2.13.3 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression. Mitigation for this vulnerability needs security enhancement added in brotli v1.2.0.
Severity ?
7.5 (High)
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 1.1.0"
},
"package": {
"ecosystem": "PyPI",
"name": "brotli"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.0"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 2.13.3"
},
"package": {
"ecosystem": "PyPI",
"name": "Scrapy"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.13.4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-6176"
],
"database_specific": {
"cwe_ids": [
"CWE-400"
],
"github_reviewed": true,
"github_reviewed_at": "2025-10-31T21:23:47Z",
"nvd_published_at": "2025-10-31T00:15:37Z",
"severity": "HIGH"
},
"details": "Scrapy versions up to 2.13.3 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression. Mitigation for this vulnerability needs security enhancement added in brotli v1.2.0.",
"id": "GHSA-2qfp-q593-8484",
"modified": "2025-11-17T15:50:19Z",
"published": "2025-10-31T00:30:35Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6176"
},
{
"type": "WEB",
"url": "https://github.com/google/brotli/issues/1327"
},
{
"type": "WEB",
"url": "https://github.com/google/brotli/issues/1375"
},
{
"type": "WEB",
"url": "https://github.com/google/brotli/pull/1234"
},
{
"type": "WEB",
"url": "https://github.com/scrapy/scrapy/pull/7134"
},
{
"type": "WEB",
"url": "https://github.com/google/brotli/commit/67d78bc41db1a0d03f2e763497748f2f69946627"
},
{
"type": "WEB",
"url": "https://github.com/scrapy/scrapy/commit/14737e91edc513967f516fc839cc9c8a4f8d91da"
},
{
"type": "PACKAGE",
"url": "https://github.com/google/brotli"
},
{
"type": "WEB",
"url": "https://github.com/google/brotli/releases/tag/v1.2.0"
},
{
"type": "WEB",
"url": "https://huntr.com/bounties/2c26a886-5984-47ee-a421-0d5fe1344eb0"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "Scrapy is vulnerable to a denial of service (DoS) attack due to flaws in brotli decompression implementation"
}
WID-SEC-W-2026-0008
Vulnerability from csaf_certbund - Published: 2026-01-04 23:00 - Updated: 2026-02-16 23:00Summary
Red Hat Enterprise Linux: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux bezüglich der Komponenten "tar" und "Scrapy" ausnutzen, um Dateien zu manipulieren, und um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux bez\u00fcglich der Komponenten \"tar\" und \"Scrapy\" ausnutzen, um Dateien zu manipulieren, und um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0008 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0008.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0008 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0008"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2026-01-04",
"url": "https://access.redhat.com/errata/RHSA-2026:0002"
},
{
"category": "external",
"summary": "RedHat Customer Portal vom 2026-01-04",
"url": "https://access.redhat.com/security/cve/cve-2025-45582"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2026-01-04",
"url": "https://access.redhat.com/errata/RHSA-2026:0008"
},
{
"category": "external",
"summary": "RedHat Customer Portal vom 2026-01-04",
"url": "https://access.redhat.com/security/cve/cve-2025-6176"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0067 vom 2026-01-06",
"url": "https://linux.oracle.com/errata/ELSA-2026-0067.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0002 vom 2026-01-05",
"url": "https://linux.oracle.com/errata/ELSA-2026-0002.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0067 vom 2026-01-05",
"url": "https://access.redhat.com/errata/RHSA-2026:0067"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0067 vom 2026-01-06",
"url": "https://errata.build.resf.org/RLSA-2026:0067"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0135 vom 2026-01-06",
"url": "https://access.redhat.com/errata/RHSA-2026:0135"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0414 vom 2026-01-09",
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0435 vom 2026-01-12",
"url": "https://access.redhat.com/errata/RHSA-2026:0435"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0434 vom 2026-01-12",
"url": "https://access.redhat.com/errata/RHSA-2026:0434"
},
{
"category": "external",
"summary": "RedHat Security Advisory",
"url": "https://access.redhat.com/errata/RHSA-2026:0434"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0685 vom 2026-01-15",
"url": "https://access.redhat.com/errata/RHSA-2026:0685"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0761 vom 2026-01-19",
"url": "https://access.redhat.com/errata/RHSA-2026:0761"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0845 vom 2026-01-20",
"url": "https://access.redhat.com/errata/RHSA-2026:0845"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0845 vom 2026-01-20",
"url": "https://linux.oracle.com/errata/ELSA-2026-0845.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0845 vom 2026-01-21",
"url": "https://errata.build.resf.org/RLSA-2026:0845"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0950 vom 2026-01-22",
"url": "https://access.redhat.com/errata/RHSA-2026:0950"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1652 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1652"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1858 vom 2026-02-03",
"url": "https://access.redhat.com/errata/RHSA-2026:1858"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2042 vom 2026-02-05",
"url": "https://access.redhat.com/errata/RHSA-2026:2042"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7259752 vom 2026-02-05",
"url": "https://www.ibm.com/support/pages/node/7259752"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2042 vom 2026-02-06",
"url": "http://linux.oracle.com/errata/ELSA-2026-2042.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2226 vom 2026-02-09",
"url": "https://access.redhat.com/errata/RHSA-2026:2226"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2229 vom 2026-02-09",
"url": "https://access.redhat.com/errata/RHSA-2026:2229"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2227 vom 2026-02-09",
"url": "https://access.redhat.com/errata/RHSA-2026:2227"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2228 vom 2026-02-09",
"url": "https://access.redhat.com/errata/RHSA-2026:2228"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2042 vom 2026-02-07",
"url": "https://errata.build.resf.org/RLSA-2026:2042"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7260087 vom 2026-02-09",
"url": "https://www.ibm.com/support/pages/node/7260087"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2389 vom 2026-02-10",
"url": "https://access.redhat.com/errata/RHSA-2026:2389"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2401 vom 2026-02-10",
"url": "https://access.redhat.com/errata/RHSA-2026:2401"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2400 vom 2026-02-10",
"url": "https://access.redhat.com/errata/RHSA-2026:2400"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2399 vom 2026-02-10",
"url": "https://access.redhat.com/errata/RHSA-2026:2399"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2389 vom 2026-02-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-2389.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2455 vom 2026-02-10",
"url": "https://access.redhat.com/errata/RHSA-2026:2455"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2737 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2737"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-02-16T23:00:00.000+00:00",
"generator": {
"date": "2026-02-17T09:05:24.950+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0008",
"initial_release_date": "2026-01-04T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-01-04T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-01-05T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2026-01-06T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-08T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-11T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-14T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-19T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-20T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von IBM und Oracle Linux aufgenommen"
},
{
"date": "2026-02-08T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-02-09T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-10T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "18"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IBM App Connect Enterprise",
"product": {
"name": "IBM App Connect Enterprise",
"product_id": "T032495",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Operator",
"product": {
"name": "IBM MQ Operator",
"product_id": "T036688",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:operator"
}
}
}
],
"category": "product_name",
"name": "MQ"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10",
"product": {
"name": "Red Hat Enterprise Linux \u003c10",
"product_id": "T049693"
}
},
{
"category": "product_version",
"name": "10",
"product": {
"name": "Red Hat Enterprise Linux 10",
"product_id": "T049693-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-45582",
"product_status": {
"known_affected": [
"T049693",
"67646",
"T036688",
"T004914",
"T032255",
"T032495"
]
},
"release_date": "2026-01-04T23:00:00.000+00:00",
"title": "CVE-2025-45582"
},
{
"cve": "CVE-2025-6176",
"product_status": {
"known_affected": [
"T049693",
"67646",
"T036688",
"T004914",
"T032255",
"T032495"
]
},
"release_date": "2026-01-04T23:00:00.000+00:00",
"title": "CVE-2025-6176"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…